Analysis
-
max time kernel
139s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 04:17
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\Guna.UI2.dll family_agenttesla behavioral1/memory/4312-640-0x000001EA48BE0000-0x000001EA48DD4000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
Processes:
crack.exepid process 4312 crack.exe -
Loads dropped DLL 1 IoCs
Processes:
crack.exepid process 4312 crack.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\XWorm V5.2.exe agile_net behavioral1/memory/4312-630-0x000001EA48F00000-0x000001EA49B38000-memory.dmp agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
crack.exemsedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion crack.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS crack.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer crack.exe -
Modifies registry class 2 IoCs
Processes:
msedge.exemsedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-17203666-93769886-2545153620-1000\{50275FC9-2591-4D72-AB3B-910C58D5D204} msedge.exe Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exemsedge.exepid process 5052 msedge.exe 5052 msedge.exe 2948 msedge.exe 2948 msedge.exe 3328 identity_helper.exe 3328 identity_helper.exe 5324 msedge.exe 5324 msedge.exe 5216 msedge.exe 5216 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
Processes:
msedge.exepid process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7zG.execrack.exedescription pid process Token: SeRestorePrivilege 6020 7zG.exe Token: 35 6020 7zG.exe Token: SeSecurityPrivilege 6020 7zG.exe Token: SeSecurityPrivilege 6020 7zG.exe Token: SeDebugPrivilege 4312 crack.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
Processes:
msedge.exe7zG.exepid process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 6020 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe 2948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2948 wrote to memory of 4092 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 4092 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5112 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5052 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 5052 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe PID 2948 wrote to memory of 2000 2948 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://s28667145.weebly.com/memz-download.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9fe2046f8,0x7ff9fe204708,0x7ff9fe2047182⤵PID:4092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:2000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:3688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:4880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:3304
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:1000
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:5216
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:5496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:5604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:5688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:5320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5492 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:5948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:12⤵PID:5920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵PID:5180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6684 /prefetch:12⤵PID:5156
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3180 /prefetch:82⤵PID:5788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:5224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1312 /prefetch:12⤵PID:2584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵PID:3496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10679786648604463790,4541322413077353421,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4568
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5844
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\XWorm.V5.2\" -ad -an -ai#7zMap25663:82:7zEvent21821⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6020
-
C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\crack.exe"C:\Users\Admin\Downloads\XWorm.V5.2\XWorm V5.2\crack.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools2⤵PID:2028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9fe2046f8,0x7ff9fe204708,0x7ff9fe2047183⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dbac49e66219979194c79f1cf1cb3dd1
SHA14ef87804a04d51ae1fac358f92382548b27f62f2
SHA256f24ed6c5bf4b734a9af4d64e14a80a160bea569f50849f70bf7b7277c4f48562
SHA512bb314d61f53cf7774f6dfb6b772c72f5daf386bc3d27d2bb7a14c65848ee86e6c48e9c5696693ded31846b69b9372a530175df48494e3d61a228e49d43401ad1
-
Filesize
152B
MD5a9e55f5864d6e2afd2fd84e25a3bc228
SHA1a5efcff9e3df6252c7fe8535d505235f82aab276
SHA2560f4df3120e4620555916be8e51c29be8d600d68ae5244efad6a0268aabc8c452
SHA51212f45fa73a6de6dfe17acc8b52b60f2d79008da130730b74cc138c1dcd73ccc99487165e3c8c90dc247359fde272f1ec6b3cf2c5fcb04e5093936144d0558b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD51752666005849a9536b73a22319329c1
SHA17201f80c0e1ed428483fda5b02c403e5e59d87de
SHA25690adb746bed12f2fa430b5e64decb10ca7309ca4fbf4efa1c8dcbd1c0587ec15
SHA5129ebf9e93be30793f2c803b6d9ba23759f200ce199cd07d88051469abb79ce99c8b464018c008836fff36ec969d55882e44ce12c90f8e377f1a45503a23565ac8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD57fdf61468b0a7a36d67294b754a6a2ba
SHA135bb8c1dd8f523b68ddac5f5138a2456904e3247
SHA256ce1807324651fe7f0923529c49c5156e0bcc5453bb5765d6b24a500c3dd8782e
SHA51226bad8da6e3f667c57b8660dc22dba1abe1274b288de94c9c72f2584d233d435fd5cae25137f5157578d63a4f13a62db40167e0404e30ee18bfac6582c88528b
-
Filesize
1KB
MD537a26f17aebc094784904be08ba659e4
SHA1475fb409510d97807e854ba83f525731fa105931
SHA25696c8750d45234e942a55714ac3160c69c126e26d5b37d92c289d96da39f99551
SHA512adf30ef2dcc02982fbb86a5506a2ed30e35a20e8112ed3e93e35dcf261143789782782179044a1f84253852bf7793d14df80bcfbab45cd17651ba288b8ffaf1f
-
Filesize
5KB
MD544481af275951bfb8585a0885f51ddcf
SHA10e288de8f00ad662cfc657211b69dc02fc580fc4
SHA256e998491682617d235c746937c04e3d2303512fcfc0c3871ea58744d969032a56
SHA512930ad6c3344d63514ce2f8c9f1953874b0d2780922f39189f3782606157e4f8d2ebefa5b97ea613516487de79abd7be892d498367e3adc335ae61840913d4b90
-
Filesize
7KB
MD50ba40d83184c5552f33c88126ffa95b9
SHA1abb04bf2dbf330107fdfc7603a4ae7d2b98d0858
SHA25649f58ab5925c4985d9294bf324f664c73fcde439d95b0b06bd1aba8e5075e127
SHA512b54cb80b3c9830fd12b505a5de9968f089ba382cb81f4c88b862638b2b0841cfd99121c4d870f5971e0f44bb819edfd557866136174a71b26092d7985faa8ee2
-
Filesize
7KB
MD5b6965a1c2782c2fbceb77dea7f3695d6
SHA1fd5b08c40fa9e9425979d66fbde7d7c990f3fa95
SHA25641d1af7e657230ce62925b201982132b0fd573d02a9b277a493243817d2b969c
SHA512daa5e9e25f5159aca5504ed33de8a6164b9d063ab2a62e31da262e39e7d8a7a2ffafb52269a540803401a687c437bc81cf0da9dc24e3bfdc0e61ec82226e41f0
-
Filesize
6KB
MD5bfabdefa4240e5778a4765840e338f6c
SHA139f5df422d2622ae3fd71aa11ad7ea1af657b101
SHA2563d4d59f352f94aa4a1eeab387c8831ed4b5299358c1db41e469a588f14c7a253
SHA51291aa447208091a13978a919c1038fd9b9698e3db206dd047de7be0ca0da303ff5e8ec2bf08bee75b6379473a37e81a2eb32da78c82e96c425dd77f2a747a8e95
-
Filesize
2KB
MD5233f69b5695eb2a0e5dce32ed5d407a7
SHA12c66fec7b06b2f2618979392e77db3787539e23d
SHA256857c4f2fb6a0b163ee584d878d5548913c73ebf603741548d1086649e9b16593
SHA5126e522b2ce18f52d71d1416795263867152a87ddc9bc3740458697205b41ae7ef695c8e53996a41eb2fc63b65fa9113ac9bb0d0c1d8faa6e8a132e92f5acf9db8
-
Filesize
1KB
MD52af3a80c738a68ea499ef2cf0a15d32c
SHA132e0f72863d6e8ba27ed56cfd14f6fe23e4feb86
SHA256cc10b062795f502db17a417d3cff50360a0291b0afbec6f315d01301acd505fb
SHA512dc45f99d9e3c80903e1f2afae1dac8185410ec02b0f3793919007b036f775410233a4b6af1cb7cc8e33dd801b10208a62be8c73befc23bd35307943986e50f94
-
Filesize
1KB
MD5a0ed8a9fdad206d07d7a55145c0ebcfe
SHA100694e9618f870bffc0d47c90657d532748410f3
SHA25657e354a05fc9ac127fb8927e8788b35dc3bdfcd911e6523e4b7639e27bbb764d
SHA51221b1f5ea3ed776dc265512bbd2f11b05f171fdabd6dcee14e1375101434c2164abd15ad39b2b70104afd9eecbdb5ccb60679e4a477c0cf4b8871466025344b98
-
Filesize
1KB
MD59d0c27279e7a99aac2b3365b73a9fdad
SHA1f76bfd5a49a37d0133e9e62cd202fa4bf6237688
SHA2565149662e8e5fc1c2778e1e6694c6063eaee31a4f758ba1a528b94e0c621d13c2
SHA5127fdd67069a8130a7a136969b3a47cd04860959c4e4c19f6b9d4e4a0f7f60cfa003788c96a8ff338ed90677be9cd0d3ccea5c24e43886c4cc5256b3033d066e82
-
Filesize
371B
MD57f8317bf253fa4254076c61a95b46fd1
SHA102f7be355bfc306ac9761a4a1edcd9cdbb6cd43d
SHA2560328101fc36e2c6747dce0551deadac3329930c7dcc008c07ffcf4aa5d9f35d0
SHA5128e74fe5d5133a791d882bb17d1206ffc3845cfb29cd9f64bbf712a0f331381963bffc184af9c38884fc48a0f5248bfbbe06174fb4f2ae654db33d61d28dd620e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD536cb073bee24858d456c8d5ac3643689
SHA19bae79c34a0dc4d73fb4696cdb29596b2033d6b2
SHA2564b8e0382a45ea23c8ac8edaec5806875edbd046446ca603ec9be9873d81ff9a3
SHA51246ade186cfc135b4443ee107cbe255650de4a8556267fdad812da014cef38e81964cb0df3c425e2d115e11f2ed2853963df6bd3c14378dcfaea0b296c9ba88b1
-
Filesize
12KB
MD58918cd8ea29f0fa72bbdee1567a2db1b
SHA186afebe6be39767881d06f67b9b773888428fa39
SHA25679435904e5285b3e734d65dada6ce7e886a2871e7b0ad50bc8de3f5e7fdbfb6a
SHA5125cabbe891cea8f69de5c36a117029f3b771a0f5df09e57297b73bd1a85d740d77dec1f58a8cd4ccfe9dfe29d8b0eb9466b9a9f553916029ed8c82932a11f1f3a
-
Filesize
11KB
MD5051293857ed2f8f7832136a92571cb7d
SHA1595cce186c5711b4d417a54d21cdb195af1ae5ba
SHA25673b1aeae2d3427e644168bff395e3b671fd53ce7221112a232101cbae1ef1dc1
SHA512563be49eb46d7e5a93e0cd7b68471409994b21afc63b69276f51cd74737777ae9fe3b9f9196703bf03a8978ba4bd6ddbb80a52d36bf36b8ea3a70047bda5708f
-
Filesize
112KB
MD52f1a50031dcf5c87d92e8b2491fdcea6
SHA171e2aaa2d1bb7dbe32a00e1d01d744830ecce08f
SHA25647578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed
SHA5121c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8
-
Filesize
30.4MB
MD52a16b9474dd55ed48f1602c4a17a3b60
SHA1f279b4a379e4c30e134ccb6a2837dbceecce9d13
SHA2566a4beba8dda5d6d9b9f301c6bcf100b05d8c192453ee7d293efbe95f9a0f76c9
SHA512b2ceeeb17f77c589068259ba07c2c1ccef420af17398f26b6bb92729771c6fb67bcbb2a139243c77dbdfc9dcddcc3e71a805b1645d70afcbbc08b27c7c0881e4
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
361KB
MD5e3143e8c70427a56dac73a808cba0c79
SHA163556c7ad9e778d5bd9092f834b5cc751e419d16
SHA256b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188
SHA51274e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc
-
Filesize
350KB
MD5de69bb29d6a9dfb615a90df3580d63b1
SHA174446b4dcc146ce61e5216bf7efac186adf7849b
SHA256f66f97866433e688acc3e4cd1e6ef14505f81df6b26dd6215e376767f6f954bc
SHA5126e96a510966a4acbca900773d4409720b0771fede37f24431bf0d8b9c611eaa152ba05ee588bb17f796d7b8caaccc10534e7cc1c907c28ddfa54ac4ce3952015
-
Filesize
138KB
MD5dd43356f07fc0ce082db4e2f102747a2
SHA1aa0782732e2d60fa668b0aadbf3447ef70b6a619
SHA256e375b83a3e242212a2ed9478e1f0b8383c1bf1fdfab5a1cf766df740b631afd6
SHA512284d64b99931ed1f2e839a7b19ee8389eefaf6c72bac556468a01f3eb17000252613c01dbae88923e9a02f3c84bcab02296659648fad727123f63d0ac38d258e
-
Filesize
216KB
MD5b808181453b17f3fc1ab153bf11be197
SHA1bce86080b7eb76783940d1ff277e2b46f231efe9
SHA256da00cdfab411f8f535f17258981ec51d1af9b0bfcee3a360cbd0cb6f692dbcdd
SHA512a2d941c6e69972f99707ade5c5325eb50b0ec4c5abf6a189eb11a46606fed8076be44c839d83cf310b67e66471e0ea3f6597857a8e2c7e2a7ad6de60c314f7d3
-
Filesize
6KB
MD56512e89e0cb92514ef24be43f0bf4500
SHA1a039c51f89656d9d5c584f063b2b675a9ff44b8e
SHA2561411e4858412ded195f0e65544a4ec8e8249118b76375050a35c076940826cd0
SHA5129ffb2ff050cce82dbfbbb0e85ab5f976fcd81086b3d8695502c5221c23d14080f0e494a33e0092b4feb2eda12e2130a2f02df3125733c2f5ec31356e92dea00b
-
Filesize
319KB
MD579f1c4c312fdbb9258c2cdde3772271f
SHA1a143434883e4ef2c0190407602b030f5c4fdf96f
SHA256f22a4fa1e8b1b70286ecf07effb15d2184454fa88325ce4c0f31ffadb4bef50a
SHA512b28ed3c063ae3a15cd52e625a860bbb65f6cd38ccad458657a163cd927c74ebf498fb12f1e578e869bcea00c6cd3f47ede10866e34a48c133c5ac26b902ae5d9
-
Filesize
241KB
MD5d34c13128c6c7c93af2000a45196df81
SHA1664c821c9d2ed234aea31d8b4f17d987e4b386f1
SHA256aaf9fb0158bd40ab562a4212c2a795cb40ef6864042dc12f3a2415f2446ba1c7
SHA51291f4e0e795f359b03595b01cbf29188a2a0b52ab9d64eadd8fb8b3508e417b8c7a70be439940975bf5bdf26493ea161aa45025beb83bc95076ed269e82d39689
-
Filesize
12.2MB
MD58b7b015c1ea809f5c6ade7269bdc5610
SHA1c67d5d83ca18731d17f79529cfdb3d3dcad36b96
SHA2567fc9c7002b65bc1b33f72e019ed1e82008cc7b8e5b8eaf73fc41a3e6a246980e
SHA512e652913f73326f9d8461ac2a631e1e413719df28c7938b38949c005fda501d9e159554c3e17a0d5826d279bb81efdef394f7fb6ff7289cf296c19e92fd924180
-
Filesize
109KB
MD5e6a20535b636d6402164a8e2d871ef6d
SHA1981cb1fd9361ca58f8985104e00132d1836a8736
SHA256b461c985b53de4f6921d83925b3c2a62de3bbc5b8f9c02eecd27926f0197fae2
SHA51235856a0268ed9d17b1570d5392833ed168c8515d73fac9f150cf63cc1aea61c096aa2e6b3c8e091a1058ba062f9333f6767e323a37dfb6f4fa7e508a2a138a30
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e