Overview
overview
10Static
static
30dfc7afcaa...c4.exe
windows7-x64
30dfc7afcaa...c4.exe
windows10-2004-x64
10104ab96ec5...91.exe
windows10-2004-x64
10150d5d207f...74.exe
windows10-2004-x64
1019408d20ed...1b.exe
windows7-x64
319408d20ed...1b.exe
windows10-2004-x64
10209f361ec5...19.exe
windows7-x64
3209f361ec5...19.exe
windows10-2004-x64
1032df5b0360...59.exe
windows10-2004-x64
105a9212ccca...d1.exe
windows10-2004-x64
106547f1c95b...de.exe
windows10-2004-x64
1071abd07878...2a.exe
windows7-x64
371abd07878...2a.exe
windows10-2004-x64
107d7131e841...77.exe
windows10-2004-x64
10981d198e1d...05.exe
windows7-x64
3981d198e1d...05.exe
windows10-2004-x64
109be0387d86...b9.exe
windows10-2004-x64
109d44150fdc...7d.exe
windows10-2004-x64
6b7da28873d...d0.exe
windows10-2004-x64
10c6bd926d58...44.exe
windows10-2004-x64
10d599ef82af...3c.exe
windows10-2004-x64
10db2419395b...f8.exe
windows10-2004-x64
10e7b8d2cb79...0b.exe
windows10-2004-x64
10eeebcd7da8...f5.exe
windows10-2004-x64
10f1ae7fab47...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
104ab96ec5c48fc27c7e1536ff21081aa1efc5fcfdb8ff48716f9c44afbda891.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
150d5d207fadbb612a41c8c9dae6ffe50c8cffd2db96a1cb75a5c779cbd82974.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19408d20edf49736ff3e86b9c52dcd2bf4b3da61eff72888392b2de04e27351b.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
19408d20edf49736ff3e86b9c52dcd2bf4b3da61eff72888392b2de04e27351b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
209f361ec54d3eb7e8c1324ecea4c86835a53f08014f20d8acdb405a98c70e19.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
209f361ec54d3eb7e8c1324ecea4c86835a53f08014f20d8acdb405a98c70e19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
32df5b0360337fb2cb7c64f82fa3d8fde28ff3c1028c424475918553f0dae959.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6547f1c95bc0b060cd5e5f6b8e5e968b730cd21f758f6dd5371e802b13a5a1de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
71abd07878fba4bfa822c83c9dd023f4bafbeedcce63770fad08edb14d06fd2a.exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
71abd07878fba4bfa822c83c9dd023f4bafbeedcce63770fad08edb14d06fd2a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7d7131e8413b3c93cdef92a3c5fc4874d5c98935874642f451bb7fa887f9ac77.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
981d198e1de125ce89beae1c0930fc2c9f513d88c9048e0d41c6f12c41ab0e05.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
981d198e1de125ce89beae1c0930fc2c9f513d88c9048e0d41c6f12c41ab0e05.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
9be0387d865bef272b66fe34363fa38f5c4e2be5b6b773526bfc1d14b4791eb9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
b7da28873d43a4b6acac44b82b109a2489323a219d2cece98db41b834a2f30d0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
c6bd926d58aa119662ccfb970124884439404950b8aa818378fa47a61a658a44.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
d599ef82af0badf49dd8c6cc5d7bad517685798e47a31291d482c5768dae4e3c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
db2419395b2091b54fbda644944d811a11fcb035dba5ab2e6d4b5ee327abbdf8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
e7b8d2cb79d76cc4434f9525644c524179ad84cea43f8c12ee7ad387710dfc0b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
eeebcd7da83427c994c4399d2aeda8161beb9d76926f8245160789de2d6613f5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc.exe
Resource
win10v2004-20240426-en
General
-
Target
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe
-
Size
175KB
-
MD5
b0762cb364c4a6dcaf988e98769222a2
-
SHA1
383306a9f9e8adc5f893ff3913131e6610525c95
-
SHA256
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d
-
SHA512
6e2ca96e53ffd5d89d7b800f21c7636b87935fcd8261aac4a936c96a0a3e103ee9704f7cec541c0babfc6ba66e7882d44ac4f7037219ac07c6e6e6273d3056ef
-
SSDEEP
3072:KNy+bnr+O1R5GWp1icKAArDZz4N9GhbkrNEk1pRroMK6y6S+:KNy+bnr+2p0yN90QE6KMlz
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe -
Executes dropped EXE 1 IoCs
pid Process 3316 AutoGetFTA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 880 msedge.exe 880 msedge.exe 4484 msedge.exe 4484 msedge.exe 4856 identity_helper.exe 4856 identity_helper.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe 4244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe 4484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 3316 3764 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe 83 PID 3764 wrote to memory of 3316 3764 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe 83 PID 3764 wrote to memory of 3316 3764 9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe 83 PID 3316 wrote to memory of 4484 3316 AutoGetFTA.exe 87 PID 3316 wrote to memory of 4484 3316 AutoGetFTA.exe 87 PID 4484 wrote to memory of 1584 4484 msedge.exe 88 PID 4484 wrote to memory of 1584 4484 msedge.exe 88 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 4732 4484 msedge.exe 89 PID 4484 wrote to memory of 880 4484 msedge.exe 90 PID 4484 wrote to memory of 880 4484 msedge.exe 90 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91 PID 4484 wrote to memory of 3668 4484 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe"C:\Users\Admin\AppData\Local\Temp\9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AutoGetFTA.exe -snpk:"4983000338,TXBQ9-J7PF2" -install:1 -requestID:"951147" -silent2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://activate.rockwellautomation.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff8fc9846f8,0x7ff8fc984708,0x7ff8fc9847184⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:24⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:84⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:14⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:14⤵PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:84⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:14⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:14⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:14⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:14⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,17842021976795315076,16746942163712309872,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:4244
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ae8d4ca842a734256104fb5a29002832
SHA1e348df1a4dbca942573d19e3deac8057fbc5efe5
SHA256ba82d861e45da700d9e6c468bad9f239683db48af502a69b1b730040c963aa88
SHA512465f7258f8c0c256ad3d36f408b32fc74ae0195e777f367e395443ae442deb67378e12842b567d9039a5177aaacdb4f79f0abcb7d45b1e6873ccdba1c182b266
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.rockwellautomation.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD52984d381e321afefc19378ce5a81f003
SHA1c674a6d8096378b04cfc8c35203eaac06ce057b6
SHA256be2d9a1909a702788f7e8ee7751b6d05fae0595db042c4998f30f1a9f879c710
SHA51268f97270f1f580d814d171a5c26f7e1a435d08462915abafc1b5eeab55ce966aaa47043754d72d231bd495105bd9255fe771e5148f39b4805a725c4de09d3124
-
Filesize
6KB
MD5360e5ace9820b68900eeb2410a6b71f1
SHA15143eb6059b28b77ad453575e4d3088095cd2ec2
SHA256220c9bc5848560fe94200baaaa521464dbb2f1c4f2917944b3cc0893fd2451e8
SHA5122667a3355f4290efd93a5cb5fc1d3b8ef3396ff953723c0c6ecd47f8e07e81d5c61b12f24814cb0d524243001f000e4d8295980462229ee05f5ea5c3442c71cc
-
Filesize
7KB
MD57e05f3de9639b2400911fc3bda80bf68
SHA1ec21c9373cd8fa7b1a7c1bfc47902f1854977082
SHA25639759d3ced6ff09466f8afe9abbc7a18b62e7abbdde4462c491d67126c15e4ab
SHA512980b5bcb68153eaafc56eb1ab7d72b4dcc7e63d59c5f272f4bb0d42926095a8b5a182dbe13e13b7e6d8df36baa95523afcf653b89210cbca2e37cf373af9a2fb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54b7f9817f2f7c473e3b632488f179c8b
SHA13c54b41399e676f8387075944f11c75fced2e915
SHA256152b6b4b68f378ae2d194fc7e30a7c82eca32dfd8c3d27404082f6e5f8a71a5e
SHA5122b249a4940087fc4fceaf15d9edd3c5564f59f874ab0efc9ce2d754cbf23de11137f3b66c2f3a14eb285b7b48ab31f594a315a90f0856ded8ded2eba61d0f0f1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ce2d.TMP
Filesize48B
MD5facae005e82116bc24a24e0668dfc103
SHA1905965f969f47d4a808a112143e4545a26da9902
SHA2568a4b64feb9c32c58cb075c8c42b7a15ed43b441fa9a3d2addfe4f3a8ff170c28
SHA5126a62dfbc0c921842ad3305048f6e4f93cdc63851e9be5456a6f55b6cf21884b24cfce953c503856585f8f9f175dd1ff96bffcf721a42429cff647d7c0c0db1a8
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56c60ece0e619070eb19791127417991f
SHA1389cbea07c084257987e8745eec29e2006a2e30d
SHA2562ce834d8cd645260dbc1f2d767b7c5f06c6800bb4e64627439c1eb96224c4de4
SHA5126505da9c4ac5d15fa287036e80639227a2a968b58972ea91ce4598dcab7895ece63a3eb1c834b67ef02797be887026f4792d79a4dc8f821876f62a33f0805c8c
-
Filesize
19KB
MD5b5e74e72395095e7804555f8f53cb96b
SHA12282e82dfb283581704dbaf36c71a979eb7520ba
SHA2566a3dc087a1de33c527eb6e307ec2853ec14456f1d62ada55a36974fb2a3fc158
SHA5120ee5e9d7c70bc71f3e0d5bab01223a49bc96bda63aee479f06acb9864855b04a1a6aa668e5966a58e56cfcd7d83651b89d501c2c583b58094fb60479e0de1c86