Overview
overview
10Static
static
300b85ef681...3c.exe
windows7-x64
300b85ef681...3c.exe
windows10-2004-x64
1002fa9e870a...3b.exe
windows10-2004-x64
1021feb39957...32.exe
windows10-2004-x64
1022f65486ce...8c.exe
windows10-2004-x64
10230ec3f2c3...5e.exe
windows10-2004-x64
102ea5e26c15...e7.exe
windows10-2004-x64
103352e66593...91.exe
windows10-2004-x64
93a8a7d42c4...54.exe
windows10-2004-x64
1055872fee0d...a2.exe
windows7-x64
355872fee0d...a2.exe
windows10-2004-x64
105c4e8c59ce...96.exe
windows10-2004-x64
109eded57acf...94.exe
windows10-2004-x64
10ab1944db7d...fc.exe
windows10-2004-x64
10ac6f6a7901...6b.exe
windows10-2004-x64
10afa70bcf38...3a.exe
windows10-2004-x64
10c4490bf883...30.exe
windows10-2004-x64
10c648954590...a2.exe
windows10-2004-x64
10d5755dadc9...b2.exe
windows10-2004-x64
10f066a86310...dd.exe
windows7-x64
10f066a86310...dd.exe
windows10-2004-x64
10fa130ffbae...7e.exe
windows10-2004-x64
10ffca01eab5...09.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
00b85ef681a2709f477253e1b189f4cbad5160e677d7c1640519def540c2fb3c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
00b85ef681a2709f477253e1b189f4cbad5160e677d7c1640519def540c2fb3c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
02fa9e870a9e9a0cc531855a78099113495ff912e04f39b601de63c2b4853d3b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
21feb39957e192116f1449fe8d8fdf2104aaaef3e4f6a5e516adc72ef63dbd32.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
22f65486ce4ad040f9985202d9306069315f0db3b4c66e630e358d3e8275178c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
230ec3f2c3ef81a9a14c2fc686c0aa21d93d3cca8dca04a8ecb90dd3c54c0f5e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
2ea5e26c1500a47dc848fdffa31210f94311df256bb6bd7b359e4af6894023e7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
3352e66593f9d652c7f760070d266d43ca2ba74eca75114c78a92c09c1a1c391.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
3a8a7d42c4509a4814d5eb963c05afb11363688b72aa7535816ae86e20bcf654.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
55872fee0d31d2f9381e3b62d592835be2ee776ce2c69397061fc06d6efa5ea2.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
55872fee0d31d2f9381e3b62d592835be2ee776ce2c69397061fc06d6efa5ea2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5c4e8c59ce4b4f21acc7d26ba988d8f069d256569e9565b33d865a9859a5ba96.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
9eded57acff39eca8ffe9167fa52ac5a352e13a9ce3d0f0696a5a69bf589b794.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
ab1944db7df59717e8b318a32f59870d54e081f919a261fe3ba94f98287e65fc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
ac6f6a79014cf8f7e7574684eefac7be8456184590031637c4329470e2c2d66b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
afa70bcf383e33af9cbc128ccd361170f3a0ea3cd99315128edb8e1a80aad23a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
c4490bf8834c5c3594355b47c30aba72c7684a25e0614f1a74add9993af97f30.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
c648954590b2b993dd0ec5a577cba1b52011aa076b30819cd9c278d54c229da2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
d5755dadc9af9cde67934873a4cde67dc43f1cec089cfbeef71140b67d9912b2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f066a86310e9df931f9ad80a096c41561564e2e05f5b6865c8531b7abf16e0dd.exe
Resource
win7-20240221-en
Behavioral task
behavioral21
Sample
f066a86310e9df931f9ad80a096c41561564e2e05f5b6865c8531b7abf16e0dd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral22
Sample
fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
ffca01eab57ad303c53af864d96d53e1fe5339d089ece9c9288d685395588b09.exe
Resource
win10v2004-20240508-en
General
-
Target
fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe
-
Size
3.8MB
-
MD5
8f20f82e55f613e3387d8a4393d84415
-
SHA1
1fbb59f002e77b5608e555d5fb856ec649a94128
-
SHA256
fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e
-
SHA512
3596ff1cd6012bc0c3f6a8f928dc124499b2c64406ae8e99d994e84c6f8e817869adb3c23a1ca221a418521dbba2592bef264c43514a0dbab794d69b57af3f4d
-
SSDEEP
98304:fbst8f/CbxPjMQCx+eU9XLfZUN0VoIojgMnrL8007F:fb9nCbx7My7twqFojgMnfe
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 2Xd7831.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2Xd7831.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\FANBooster131.lnk 2Xd7831.exe -
Executes dropped EXE 4 IoCs
pid Process 3688 HX6eg45.exe 4012 Aq8fa68.exe 2296 1aF72hB0.exe 2996 2Xd7831.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2Xd7831.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2Xd7831.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" HX6eg45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Aq8fa68.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MaxLoonaFest131 = "C:\\Users\\Admin\\AppData\\Local\\MaxLoonaFest131\\MaxLoonaFest131.exe" 2Xd7831.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral22/files/0x000800000002341e-20.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe 2996 2Xd7831.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1072 schtasks.exe 1216 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2568 msedge.exe 2568 msedge.exe 1488 msedge.exe 1488 msedge.exe 3988 powershell.exe 3988 powershell.exe 3988 powershell.exe 1952 identity_helper.exe 1952 identity_helper.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe 4416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2996 2Xd7831.exe Token: SeDebugPrivilege 3988 powershell.exe Token: 33 656 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 656 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2296 1aF72hB0.exe 2296 1aF72hB0.exe 2296 1aF72hB0.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 2296 1aF72hB0.exe 2296 1aF72hB0.exe 2296 1aF72hB0.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe 1488 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 2Xd7831.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 232 wrote to memory of 3688 232 fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe 85 PID 232 wrote to memory of 3688 232 fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe 85 PID 232 wrote to memory of 3688 232 fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe 85 PID 3688 wrote to memory of 4012 3688 HX6eg45.exe 86 PID 3688 wrote to memory of 4012 3688 HX6eg45.exe 86 PID 3688 wrote to memory of 4012 3688 HX6eg45.exe 86 PID 4012 wrote to memory of 2296 4012 Aq8fa68.exe 87 PID 4012 wrote to memory of 2296 4012 Aq8fa68.exe 87 PID 4012 wrote to memory of 2296 4012 Aq8fa68.exe 87 PID 2296 wrote to memory of 1488 2296 1aF72hB0.exe 88 PID 2296 wrote to memory of 1488 2296 1aF72hB0.exe 88 PID 1488 wrote to memory of 2504 1488 msedge.exe 90 PID 1488 wrote to memory of 2504 1488 msedge.exe 90 PID 4012 wrote to memory of 2996 4012 Aq8fa68.exe 91 PID 4012 wrote to memory of 2996 4012 Aq8fa68.exe 91 PID 4012 wrote to memory of 2996 4012 Aq8fa68.exe 91 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 1376 1488 msedge.exe 93 PID 1488 wrote to memory of 2568 1488 msedge.exe 94 PID 1488 wrote to memory of 2568 1488 msedge.exe 94 PID 1488 wrote to memory of 4592 1488 msedge.exe 95 PID 1488 wrote to memory of 4592 1488 msedge.exe 95 PID 1488 wrote to memory of 4592 1488 msedge.exe 95 PID 1488 wrote to memory of 4592 1488 msedge.exe 95 PID 1488 wrote to memory of 4592 1488 msedge.exe 95 PID 1488 wrote to memory of 4592 1488 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe"C:\Users\Admin\AppData\Local\Temp\fa130ffbae77f393b8c3761880769505ffbb2fe708e7fc375f0bf42732542b7e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HX6eg45.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HX6eg45.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Aq8fa68.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Aq8fa68.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1aF72hB0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1aF72hB0.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/5⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff8010846f8,0x7ff801084708,0x7ff8010847186⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:26⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:36⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2584 /prefetch:86⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:16⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:16⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:16⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:16⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5048 /prefetch:86⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5116 /prefetch:86⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:86⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:86⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4004 /prefetch:16⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:16⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:16⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:16⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2276,4021898524866477019,1358262625016604057,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1924 /prefetch:26⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Xd7831.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Xd7831.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Drops startup file
- Executes dropped EXE
- Windows security modification
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3988
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST5⤵PID:1600
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 HR" /sc HOURLY /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c schtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST5⤵PID:4160
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /RU "Admin" /tr "C:\ProgramData\OfficeTrackerNMP131\OfficeTrackerNMP131.exe" /tn "OfficeTrackerNMP131 LG" /sc ONLOGON /rl HIGHEST6⤵
- Creates scheduled task(s)
PID:1216
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:492
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b0 0x4e81⤵
- Suspicious use of AdjustPrivilegeToken
PID:656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize456B
MD5b91a34754c6eb2bcf05082ad26d59d57
SHA12def95f0a7dea73c0f4ff26d21b9a5f3b44cecff
SHA2567bd35c3c2b0f4b4baee393f94658734a19e3931db14c5781d00efaa248373384
SHA5126d6d9995167260fc8a0dc894e047492b114b3e4e2d70da3705e9b10147ce1dc93cebed24569bd3458a9b396c842a4cc08fa18b87977a81eb4cce17f789fdad77
-
Filesize
2KB
MD5c03c87a2a4e65de604e2e4e68ddbf028
SHA1d5905cd7cd0114d4dbd6b09cd09418a03338e702
SHA2560e41078f47717a9abf71bde51c7b1eb9e6d68285a86a45348150f9fe415be07d
SHA51209c43477316b95502125d45bbd077f07d18bfdd273bd6db19cf23776a42438eacf20a31413b36e7abbcea9d44709b17481fba6866dc834aa96a3b7d74e233e93
-
Filesize
2KB
MD5a4fff246d407da7969c8808fa685e931
SHA1c009da58c98ccc7231038153453019fab8a91e4a
SHA256ccf6c7116227a7fa22ff65c61ae615df7d60a3874c94117ec23aa180c4de62a5
SHA5124e766aa62ec2f2f4f32c475a7da817dc17ecea6f7c8b84a140663e946515097224b9bff61c1cfaf7fb46628ab948daf1bc813e5d543bb36cd9b7bd0ad72aca87
-
Filesize
6KB
MD56b3e064f8c663c0597127030e4c372a5
SHA1fc4a8ba37dd76269eaccd5a30c921d2ec75739bf
SHA25649d847dccdb37cc5ca22774ea8281c91e861d875dbffdf94aab21a08cc8c175d
SHA512b51ab572af3d9db1a0c8ea33ebaadcc4226f24480643ff0781c58087ad018a3bbff81a5b167c162ff59f32447d851e18b6c09ed54f7c8f3c200a50162c7756ff
-
Filesize
6KB
MD5ea783f3789d6c138c849d89653a9ad09
SHA146a413323531e29de75a6bd2819365ac8e67bda6
SHA256f580a59ff32ba1660fa5d423ba5bfad0442125d86ca9893c39ebbed8bedf8623
SHA512e79d7f0af4e18af98defca0f0d1b9ea6deb1ac5c17e43d17eef5676e5e2a623ad494e0196e660b36c0b1beba36c8c9da0ba50658a9e6e4aa2b7eb18a041f891e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\bbdf822e-6ed9-408f-8397-f9638f9aa3c1\index-dir\the-real-index
Filesize2KB
MD51ab11333eb86029af3958e15f5cd86f0
SHA1b6f8f8a8ad23ddba9b5a43cf1336bd55f599c77b
SHA256f8233c330ef6692eab8f884339ef4db9295901eef705b4d6e18ba8567952de2b
SHA5128166300e80861e221061dc550df1c28e915118cc0c50e49f66ec73ba6f0e06f0c897b71deb5e4a79de2349362be9a3ca03edeabb8012c6f8851c0407a0907c4f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\bbdf822e-6ed9-408f-8397-f9638f9aa3c1\index-dir\the-real-index~RFe57fa9c.TMP
Filesize48B
MD5d93263f812f1b69161262b940c7f2a06
SHA1c975fa9d9b2e01dc874c44a623f4a52fb6cf8ff0
SHA256c43455ba9bade7a894a7d740080f1700a7fbc3cca106ea1f7bc731d83dce60ed
SHA51261c87e3c97a89a819f885ab70ed2099459b712c8f166631572f1174982dcdaa23251de28eba76a77357772a71c3be50cc50de66f6e5075c07d012c8747e2bd33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize89B
MD50a552f6b2052d0e1bade235d99b2cfb2
SHA1523b7723311d1f2e87d50dcc66d4029d33755329
SHA256061484a6a304951cf10c4b7ab9672f78afd924b5520ae17800b2504d5c325a3a
SHA51260012f47bbe33e68efe42a0dd33bb3818d08590b124200664446e0c0805d3cbd9177458d709f603ccac113c25c8ede821787529dd553c95798773fd30dd2ddee
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize146B
MD571d467f64ef167feb9dc4bdde009b7bc
SHA18a05a21b096658a0bea704c0b91965566eba87b0
SHA2561919a7430e9dd412138c42f59fcfd8afd9d870154f3a23bb83c79148ff51be50
SHA512496c55874d7e8089aa474354cc840ccd5779a70daf32e0d8337cca125c22f68a3b9b8c942fdac1662ec287af057cb742c360c2c89e5e69ca159b8f59e1536e66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize82B
MD5ffccd2434f9be5aab91acd67ca9cf0cb
SHA17262eb7689b4019b28de1370987323edf28112d8
SHA2565f7126226df59d71958beccba2c58fad4f4a2d747d103affb89232d3670e1b24
SHA512e8febd149fd5129f92570287ca8a5cb847e66f39d124811aa45015df2e2aa5110558c90f86d5273abc336cfbd32c4356c40637e339804939acb51b0779647d24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt.tmp
Filesize84B
MD5446720866ecec7e418e2ce567b964e53
SHA16ebbb095599501c566acec932c07df3b5833d213
SHA2563ebf394dad1ff7d14c2f7bd1eec9ae03142475718b240e2294935e68873c00ef
SHA5124be2e43e41cb7b4aae540d07733bd5bb7dc37275b1e97a02e1dcf9feac47d299ee135e645055f3f15c95d8d2b44c1d989588c2021e2f4c38a290e7ff545e71f5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD538b59f30c113404d10fb96b3ab31f653
SHA131edbeb617f7dbeff5291301ba879f50da758218
SHA256e9036c153781908534d65d65fca41badc90fb2376a13a79b0513ba9805168456
SHA5129113582f55e5d7f324b59ef52a0d7ac4f8cca8bc48d69f1b1c3ef837224a4358d611dc664fc40749c57d2c1c272909aa17fc27388644feb5b06c9b23103a2ad2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57f25f.TMP
Filesize48B
MD5aa170863c16fef2570dbbc906dde6989
SHA15558f8e9e103a542cef901c0bc50171c1edc5472
SHA2562a196af3bde8503ef08f496c3d8322c7c84e827201761755d94f5342cfe287d6
SHA512a709b89e025e1bf80934b323b5eb05a3d548b6d8d44430303e1f1dd426e6c704632e6287318a3e8452090be395de2c0a09b51316f59968d30a86cf56997e929e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56123b3690a8f871194675947b959ed87
SHA1f3120d960dc9b678de26a5e5701b47d8fd9adfeb
SHA25675e09c52d674f2a2476cf632082bb7dbdbc8a8970a0b0ff0e4c0037e69718489
SHA512dc0b4e01b57b98c28fd27a7d1f8cabd2e7ca47298f5ce106c79bc2a8441530ea5a9d89e268567f6b982822b8e8576ae585c7e7a5cbe1a2e03a5e51e4718beb71
-
Filesize
2.4MB
MD5b56c9c48c9be9fe4136433ba42ff386b
SHA1ca41a545b363d093d54478164341a674d14fc20e
SHA2566547f1c95bc0b060cd5e5f6b8e5e968b730cd21f758f6dd5371e802b13a5a1de
SHA512cd0d1d2515ddfa2f82c0a231ac628087ec07e12ae18f16725c8c00f143e42babbdf6fdaa364c3a73995b11c500229ed2b80fb0b49ee9c053b27d00c0318b30f4
-
Filesize
2.0MB
MD5e1ca89e321f8198d4253c9178eb523ff
SHA1fe072ee589998082c37b054c4d8e4f0a6aa4eeb7
SHA2563e36cb02ee15f0803929c4cc4ae0639ce652b40ae83519e020dc3e5273dde39a
SHA512af0d2629e4fce28b141f77762d351ff64c64fc965b9fd51bad073948841c6ea19655e34a7d1aed30837c67cac6e0e5f8af52e9eca07d58a77fdf3d213cd59f2d
-
Filesize
894KB
MD53e82adb682d9d441331dde8a3c888f6e
SHA16dc1fe6731402b85d721946e65559a375878a3e1
SHA2564b87018ae58796055ba9ae76bc21519c1e51f7dcfa79344b27047efec6d9d666
SHA512f346d6eea780ae0cf5faf8fcbb7815a0c461de710a013ac5106c9eaad31dd778765c8709550911921653a13c3e94e5d860b472a671944b51edfa840c019ccca7
-
Filesize
1.5MB
MD5fb69bac77dd5e98885e6caea73271736
SHA151ad255e0b6ffe879375c4cda30f8791a13e1c55
SHA256302f18643a0476b96ae334230de72d315f753902124fbb9b97d73d73941eed7e
SHA5123558688f41a573793d4d717316b1243d1371bb02f7f2c41a5156c60fdbc66a38ab36ce0f3c57f6fb4f4da5b546b6f18eff663d5647829432c02ce2693f856716
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82