Overview
overview
10Static
static
10ZHacks____...dme.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...DME.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...DME.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...DME.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...val.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...nge.js
windows11-21h2-x64
3ZHacks____...ref.js
windows11-21h2-x64
3ZHacks____...DME.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...ion.js
windows11-21h2-x64
3ZHacks____...ess.js
windows11-21h2-x64
3ZHacks____...nit.js
windows11-21h2-x64
3ZHacks____...ery.js
windows11-21h2-x64
3ZHacks____...est.js
windows11-21h2-x64
3ZHacks____...nse.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...yer.js
windows11-21h2-x64
3ZHacks____...ute.js
windows11-21h2-x64
3ZHacks____...ils.js
windows11-21h2-x64
3ZHacks____...iew.js
windows11-21h2-x64
3ZHacks____...DME.js
windows11-21h2-x64
3ZHacks____...dex.js
windows11-21h2-x64
3ZHacks____...DME.js
windows11-21h2-x64
3Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
11-05-2024 09:24
Behavioral task
behavioral1
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/depd/Readme.js
Resource
win11-20240426-en
Behavioral task
behavioral2
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/depd/index.js
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/depd/lib/browser/index.js
Resource
win11-20240426-en
Behavioral task
behavioral4
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/destroy/README.js
Resource
win11-20240508-en
Behavioral task
behavioral5
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/destroy/index.js
Resource
win11-20240508-en
Behavioral task
behavioral6
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/ee-first/README.js
Resource
win11-20240419-en
Behavioral task
behavioral7
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/ee-first/index.js
Resource
win11-20240426-en
Behavioral task
behavioral8
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/encodeurl/README.js
Resource
win11-20240426-en
Behavioral task
behavioral9
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/encodeurl/index.js
Resource
win11-20240508-en
Behavioral task
behavioral10
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/es-define-property/index.js
Resource
win11-20240426-en
Behavioral task
behavioral11
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/es-define-property/test/index.js
Resource
win11-20240508-en
Behavioral task
behavioral12
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/es-errors/eval.js
Resource
win11-20240426-en
Behavioral task
behavioral13
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/es-errors/index.js
Resource
win11-20240508-en
Behavioral task
behavioral14
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/es-errors/range.js
Resource
win11-20240508-en
Behavioral task
behavioral15
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/es-errors/ref.js
Resource
win11-20240426-en
Behavioral task
behavioral16
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/etag/README.js
Resource
win11-20240426-en
Behavioral task
behavioral17
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/etag/index.js
Resource
win11-20240426-en
Behavioral task
behavioral18
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/index.js
Resource
win11-20240426-en
Behavioral task
behavioral19
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/application.js
Resource
win11-20240508-en
Behavioral task
behavioral20
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/express.js
Resource
win11-20240508-en
Behavioral task
behavioral21
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/middleware/init.js
Resource
win11-20240426-en
Behavioral task
behavioral22
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/middleware/query.js
Resource
win11-20240508-en
Behavioral task
behavioral23
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/request.js
Resource
win11-20240419-en
Behavioral task
behavioral24
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/response.js
Resource
win11-20240426-en
Behavioral task
behavioral25
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/router/index.js
Resource
win11-20240508-en
Behavioral task
behavioral26
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/router/layer.js
Resource
win11-20240508-en
Behavioral task
behavioral27
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/router/route.js
Resource
win11-20240426-en
Behavioral task
behavioral28
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/utils.js
Resource
win11-20240426-en
Behavioral task
behavioral29
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/express/lib/view.js
Resource
win11-20240426-en
Behavioral task
behavioral30
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/finalhandler/README.js
Resource
win11-20240508-en
Behavioral task
behavioral31
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/finalhandler/index.js
Resource
win11-20240508-en
Behavioral task
behavioral32
Sample
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/forwarded/README.js
Resource
win11-20240419-en
General
-
Target
ZHacks____SolaraBETA3/Monaco/fileaccess/node_modules/depd/Readme.js
-
Size
9KB
-
MD5
42d9d887a8cce3b2ab9c8da4faed33e3
-
SHA1
dee99fab95a6441191c709b010babb1a7015b575
-
SHA256
11deb26eafa25a465ffb8a8e3c28195eb40e679fda52b760132dbe9c9b21fb5c
-
SHA512
d9b07553c1c5fc505732d1435b81accbfe5d164728fd0c7ea0e179582bc6f4fb9da7047e119468e6431903dda8564d4a26608cdfab5e2f7344d2f56a25b021ad
-
SSDEEP
192:pC3g93tCl7wTGdJfXkSCbkIwtN49jTgokqtEnKwGqM0J5GcTYGphchGvna:KM960TGAS/IwtN49jTgoksEnKwq0J5M9
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3938118698-2964058152-2337880935-1000\{D6343EA9-61E5-4D9A-8A2A-133F4C7882D6} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4352 msedge.exe 4352 msedge.exe 4648 msedge.exe 4648 msedge.exe 924 msedge.exe 924 msedge.exe 1368 identity_helper.exe 1368 identity_helper.exe 1472 msedge.exe 1472 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3116 4648 msedge.exe 85 PID 4648 wrote to memory of 3116 4648 msedge.exe 85 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4088 4648 msedge.exe 86 PID 4648 wrote to memory of 4352 4648 msedge.exe 87 PID 4648 wrote to memory of 4352 4648 msedge.exe 87 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88 PID 4648 wrote to memory of 2548 4648 msedge.exe 88
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\ZHacks____SolaraBETA3\Monaco\fileaccess\node_modules\depd\Readme.js1⤵PID:4396
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff93c193cb8,0x7ff93c193cc8,0x7ff93c193cd82⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:22⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4536 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4580 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3884 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3420 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6408 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6716 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6744 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6884 /prefetch:12⤵PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1800,16554729330612427831,11546827630146424442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6940 /prefetch:12⤵PID:2600
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5046d49efac191159051a8b2dea884f79
SHA1d0cf8dc3bc6a23bf2395940cefcaad1565234a3a
SHA25600dfb1705076450a45319666801a3a7032fc672675343434cb3d68baccb8e1f7
SHA51246961e0f0e4d7f82b4417e4aac4434e86f2130e92b492b53a194255bd3bba0855069524cd645f910754d4d2dbf3f1dc467bcc997f01dc6b1d8d6028e2d957236
-
Filesize
152B
MD534d22039bc7833a3a27231b8eb834f70
SHA179c4290a2894b0e973d3c4b297fad74ef45607bb
SHA256402defe561006133623c2a4791b2baf90b92d5708151c2bcac6d02d2771cd3d6
SHA512c69ee22d8c52a61e59969aa757d58ab4f32492854fc7116975efc7c6174f5d998cc236bbf15bce330d81e39a026b18e29683b6d69c93d21fea6d14e21460a0a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD51f5d2eabe4c65d921cccf6ba82ca8ce6
SHA18c0e965f2775763fdcaa0debdd0225896367cf64
SHA256d4e2afe5a834870ba144c1b5b5201ab3fbe10ae2a8887f33a7a1420f6eb6863f
SHA512b4ec16d7ec7e42d4a15d9f51298f72040abd57b0c20591969f0fc71e5a74aaa90d3b0640d655dcf49e380133e628dbdc18bd07fbaf701b55d118aba68cbb1794
-
Filesize
5KB
MD55d89609982a6657710011b77e32cbe62
SHA10408fe757598939ad9f8cf3fe6fa31bd3949e4ed
SHA25627a47fce3dcc2377576dfb3c11795a0ea1463c3b981240a0d6d6a5589a78927a
SHA512f1406df7770acc5f4c25c48b4e1c9325f1cedf24deca168513e9bab2463ffc772ba52e09ed4b92bada4cea6455ffe5d8fdfa4b3ebeae6df9db6738baa59f4aa4
-
Filesize
6KB
MD5b98ac867f6f2f97f447612f60a752932
SHA15717798fe3d6f38ce5141c4fda2031a2776d59fd
SHA256af4de3ad10eedaef9fafae77cb2774e5b24c027320db7f6eb0bceae3018bd409
SHA5123a6762e5b70f5f2f62bd683ef89d31835ba125c14322a9903aaf44de127f2795c32aaa7ddc09556460873931a2c8e83b344ea220b6d230b4dcc1ef4cd53e1eb9
-
Filesize
8KB
MD5f24f4304f62dfd7c874f883347be8575
SHA10952a0f4ae5c5f5be720e1a2440206a3da6288c9
SHA256b4e00b9df15c331a4b89dfb21645837a05bb57e8b108059a0206086cc266a749
SHA5129329ece0687e0f066fae6fd1b579149e389439e0e592b308852ec3304a96eac453dd6f56a80e68646a9f7e5427aa071c5d5b30c0a472f3659ffb277a92f47c97
-
Filesize
5KB
MD55fe53d73d4f1c804ca19d459636ef6e2
SHA16c3f6b784fb6c791da8f81754207797837fdee38
SHA2563083ea61cd8a514e743bdfac4427e189926605936065ec5f1b705e3c6dd9cbac
SHA5120b82486dd1f4cabb4e048933efc0eace9a3358890dec1eca088a7589bf850b12c8a927047c84e33710e3daeab77e377b76e362215cde9c5788e2596b702c1bfc
-
Filesize
1KB
MD5afb6e44f9bfefa74ff3538d0cdf7b946
SHA1f8b390711158ba3498479015f7697563253db3b1
SHA25663e4905cdde24aec13df9fa811b956ebedd9fe4c9da502b6bd03e3da2500ff61
SHA51267ca4d1ba19be184b3a5e9f913d44c8fa9aae37ead2f0d0edd4450ab360acea2b6ddf1c3ef3b47ebcc2ef8213ca5ed933f65db139630d749929df6e295469230
-
Filesize
1KB
MD57d6342c069acb3786c04312d5edf170a
SHA1925190da5ccaff34cfeda950d581825b17fe3a84
SHA25670c27344336ca866881d2c3231c508dca476c163236d88feef92b97a61b4d897
SHA512d4661c8a851416db090d903c2d6383f2f618671c3572db671bb2c40cdf3c727a5e8d6dcb309387f1d22b019826e2a8a8551263b76dfc4ab185fb19e0d3ed4719
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5df1dbd4445ef74c20a008fbc9d75e6f9
SHA179975a81e95abb0c183219c9f2db564c2ca4aad3
SHA2564606a52d30f6b86dfe43ced867327dd2827e3ebd6f3a656da4bb4ab7198c393c
SHA512030e49695532870ae13c7056a9e49d8a10ad24997033bb62ba111afd60e5afabb5ce997b9c3adecbbfde00511880f697692b3667e7f4fef67bf5dd42944c60bd