Analysis
-
max time kernel
69s -
max time network
75s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-05-2024 13:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.xbox.com/en-US/apps/xbox-app-for-pc
Resource
win11-20240426-en
Errors
General
-
Target
https://www.xbox.com/en-US/apps/xbox-app-for-pc
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 2488 XboxInstaller.exe 340 XboxInstaller.exe 3928 XboxInstaller.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: XboxInstaller.exe File opened (read-only) \??\L: XboxInstaller.exe File opened (read-only) \??\Z: XboxInstaller.exe File opened (read-only) \??\Q: XboxInstaller.exe File opened (read-only) \??\S: XboxInstaller.exe File opened (read-only) \??\U: XboxInstaller.exe File opened (read-only) \??\X: XboxInstaller.exe File opened (read-only) \??\U: XboxInstaller.exe File opened (read-only) \??\E: XboxInstaller.exe File opened (read-only) \??\G: XboxInstaller.exe File opened (read-only) \??\P: XboxInstaller.exe File opened (read-only) \??\M: XboxInstaller.exe File opened (read-only) \??\Q: XboxInstaller.exe File opened (read-only) \??\S: XboxInstaller.exe File opened (read-only) \??\J: XboxInstaller.exe File opened (read-only) \??\V: XboxInstaller.exe File opened (read-only) \??\Z: XboxInstaller.exe File opened (read-only) \??\B: XboxInstaller.exe File opened (read-only) \??\V: XboxInstaller.exe File opened (read-only) \??\M: XboxInstaller.exe File opened (read-only) \??\T: XboxInstaller.exe File opened (read-only) \??\A: XboxInstaller.exe File opened (read-only) \??\I: XboxInstaller.exe File opened (read-only) \??\G: XboxInstaller.exe File opened (read-only) \??\O: XboxInstaller.exe File opened (read-only) \??\P: XboxInstaller.exe File opened (read-only) \??\T: XboxInstaller.exe File opened (read-only) \??\A: XboxInstaller.exe File opened (read-only) \??\N: XboxInstaller.exe File opened (read-only) \??\W: XboxInstaller.exe File opened (read-only) \??\E: XboxInstaller.exe File opened (read-only) \??\X: XboxInstaller.exe File opened (read-only) \??\Y: XboxInstaller.exe File opened (read-only) \??\I: XboxInstaller.exe File opened (read-only) \??\K: XboxInstaller.exe File opened (read-only) \??\O: XboxInstaller.exe File opened (read-only) \??\R: XboxInstaller.exe File opened (read-only) \??\L: XboxInstaller.exe File opened (read-only) \??\K: XboxInstaller.exe File opened (read-only) \??\R: XboxInstaller.exe File opened (read-only) \??\N: XboxInstaller.exe File opened (read-only) \??\W: XboxInstaller.exe File opened (read-only) \??\B: XboxInstaller.exe File opened (read-only) \??\H: XboxInstaller.exe File opened (read-only) \??\Y: XboxInstaller.exe File opened (read-only) \??\H: XboxInstaller.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4444 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "54" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\XboxInstaller.exe:Zone.Identifier msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 556949.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3988 msedge.exe 3988 msedge.exe 4516 msedge.exe 4516 msedge.exe 1180 identity_helper.exe 1180 identity_helper.exe 4628 msedge.exe 4628 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 3556 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3556 AUDIODG.EXE Token: SeShutdownPrivilege 2488 XboxInstaller.exe Token: SeCreatePagefilePrivilege 2488 XboxInstaller.exe Token: SeShutdownPrivilege 3928 XboxInstaller.exe Token: SeCreatePagefilePrivilege 3928 XboxInstaller.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5272 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 3268 4516 msedge.exe 80 PID 4516 wrote to memory of 3268 4516 msedge.exe 80 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 2016 4516 msedge.exe 81 PID 4516 wrote to memory of 3988 4516 msedge.exe 82 PID 4516 wrote to memory of 3988 4516 msedge.exe 82 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83 PID 4516 wrote to memory of 1276 4516 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.xbox.com/en-US/apps/xbox-app-for-pc1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffa35963cb8,0x7ffa35963cc8,0x7ffa35963cd82⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1916,13270910318643129435,5804296061447853565,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6700 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Users\Admin\Downloads\XboxInstaller.exe"C:\Users\Admin\Downloads\XboxInstaller.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:2488 -
C:\Users\Admin\Downloads\XboxInstaller.exe"C:\Users\Admin\Downloads\XboxInstaller.exe" -cv wfZeoykEO02dyji7.0 -enableservices3⤵
- Executes dropped EXE
PID:340 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config wuauserv start=demand4⤵
- Launches sc.exe
PID:4444
-
-
-
-
C:\Users\Admin\Downloads\XboxInstaller.exe"C:\Users\Admin\Downloads\XboxInstaller.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004C81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a2e855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ccfffa52ca088226b39888af5b15ed0
SHA1af68e813d78a4ba1ea11792794ec5d3463672dfe
SHA2560068ef3d6122838325c5c31a80ca418fd958e7a7d8c2fb3fbf13e841b778f0e4
SHA5121546eac581b100f78bbf9fd0136d5dc76e84fa336a19bed16dd487be45b446da80d28dc3c1f9857719382bc2d7f0a6c946f76d4f3effa9fd24c1c308b6285f4b
-
Filesize
152B
MD51e4ed4a50489e7fc6c3ce17686a7cd94
SHA1eac4e98e46efc880605a23a632e68e2c778613e7
SHA256fc9e8224722cb738d8b32420c05006de87161e1d28bc729b451759096f436c1a
SHA5125c4e637ac4da37ba133cb1fba8fa2ff3e24fc4ca15433a94868f2b6e0259705634072e5563da5f7cf1fd783fa8fa0c584c00f319f486565315e87cdea8ed1c28
-
Filesize
152B
MD58ff8bdd04a2da5ef5d4b6a687da23156
SHA1247873c114f3cc780c3adb0f844fc0bb2b440b6d
SHA25609b7b20bfec9608a6d737ef3fa03f95dcbeaca0f25953503a321acac82a5e5ae
SHA5125633ad84b5a003cd151c4c24b67c1e5de965fdb206b433ca759d9c62a4785383507cbd5aca92089f6e0a50a518c6014bf09a0972b4311464aa6a26f76648345e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD546cc3d4bd61be1d70244f50996e5b58f
SHA15c7deb5ea71a41a06b017ff0733078823938b590
SHA256ff5afb78b328304d6dbaa9fcf916e757952e96f6c9d73ac676e1b3522ac8beb6
SHA5122fe393bb6ba066328dabbc9f388c02132e5a08e6a2ddcb0dab407ea06b6b4fc5157f92b5061b7606e570d760735f7b81e2741e92265dc6501ef177c9ea376003
-
Filesize
5KB
MD5a02acfb0aea6f08133c23626c9e41d1d
SHA15586119b1bbce6e23203ab5a0eb22735ffc9fd0a
SHA256d980adc5b3c990a80bb5432e2ae030d4429c1f2a8a68ded0c1203e5316185fb7
SHA512d1ffba13643b606043cb1d3a8edf83cec03edb4d946cad2944c497471f26a3cb2e4aa5b76ec9f408fad6d463e479d0865c2b0de0e5f4796b7d5417b5795cd0af
-
Filesize
6KB
MD5f1e5acea749a07f9d7ea5880c7797808
SHA17e9c14941bdfbee9f81b28c34449ad30416373fe
SHA256c60c88a6c10d12e24fafbe5cc046c71d999f05af1cd4ba3f7a608c072cfbb405
SHA5126dd1c3b3c2425c59b85d559c10edd333207fa417ff471699cb254da25cc738d8d468db119ed515d5832b0ff647a3fce7c32ad8c4d67231e74c26b133d0edc44b
-
Filesize
1KB
MD505757b6e06680a1dcbd55b76bbdded3f
SHA1d9231137878f81b2b0a0764c184607840d9b43f6
SHA2562bb72b9847336eb254713b608cddb46816fd4b824c4e825cdfc65d452c0d7602
SHA512cb62e56b067cc5f391182d127dc568485ab5365222e6f5b2d7c970d78ad445b72f97088a77f0a832d96c9fa9eaf11d08f75f64cc4a0ffe6710f87144d08fa962
-
Filesize
1KB
MD5ba1e073dac8c1b7fc13f09ea3658e35b
SHA108f9b3d37ae5be0fada761a5b6fed04f9016a6a1
SHA256183360d82b9834a10f9c6afa6d0e07a924b680badcb792e3b0c0807368124145
SHA5128be9797829b3efc91b84465b8c2e66f1108291e3f192a4b851895b46a6829288e9b63cef8493b0693cd4cc804d9087c77da27d05836dd7e32013768dd1c46cfb
-
Filesize
1KB
MD5f5188815e45f47b0324798824c2217ec
SHA15633287bf7b0807cda288eae42aefd65a88d1deb
SHA256682a50cd7e3da9661e2d8de5618bbc6c4444cd02b0dea667cc80f37a44025ea0
SHA5127d4dc4e504297de83567728540e1d05a8e8dd7b6f07bbffe68464fd574f7119a709702acb214f38d8e9def96dd9e340ddd3745f92236d29b395d9df6c3a87fd9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD56f8b2362422958e11054df94c21bb752
SHA10e6eaed67f5e965342b59f69516f053e13dd6897
SHA25668cf6a5bfd72268e1bb30de1238d49781b757f6f87b15cd619db2a453c295fe1
SHA5122ae7eb1f565421c6881f7134104fc5a3014a12504ca755ac9150797a8ec4a029d2bac7837c3ff1fa86d29b604f92b715076dd72244906dcac74ad84386e6801f
-
Filesize
11KB
MD5f49bcef5508103407223d5f4f51235bb
SHA1ac3ec2c2a4878c85ad997ff17ab8f0b18332e1ce
SHA256a36bd7ec07c0454271304a377cb90a3b312dbfc9a61f7aea4fbbc7aa160d8569
SHA5128ee4585202d1f92bc782c39da212ec1355f03ea5e49cc69b880194181d1569c290ffd2d5bdc263e1697e8296c3eb743675de28c549118e39d2b2fb1c49435292
-
Filesize
11KB
MD566649698036bba200bb3df1472968be7
SHA1081a717a5100fb2541f9942d1010bdf19859d267
SHA256a0ec19a5c2d2e8ca67e4f162f8b3daf568b05b336ed8a69d860002ac2f304d7f
SHA5129196b706dca9fd63b772cbd3f52e87986dd5014e56d63ad31efe2426af08a5548b6b861086082dec216d27261af9bcf2389d9f9db439a5c4c045600aa91bac69
-
Filesize
384KB
MD59d1254af947e5ba3c7ae16bd31118c81
SHA131dfd8f5178aaa4244d52cce9ae63fa9da5b34fe
SHA256a70d5695b2b71191087f14a1122c9a986f4b0f9fe94d8d0d561f8f7a7ae1fc15
SHA51292e8265512a7fd280fb625803768360c1798f1fc79431c83034867fbf2a3305fddf9289808f880bff48773908385469a8b996a104ad7f4daa8888e8b2f23a12c
-
Filesize
1024KB
MD57d61b5cc157919827489f85b3d5dbe93
SHA12c5a1e5c3a4fb7599e1b7e27d178fb2c5782448e
SHA2567780ef2549cecc5c042eba86a0ab00f8b16137ac510bbc0a6c689ce79a3724b6
SHA512a31667727c6bd252c7732a1b4f4429624bbfb7500dddeaf65be3f8ea370fe37aaadd069030e947529dbe9c1b90e81b1de602b9e6556554dc6e1be4fcb8703108
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
327KB
MD593bd7bf04d77912d98aaed6decad1b8e
SHA1885cd97fe084cc15c339aa9131dbaa98bdec38fe
SHA256a90c6244e2202b30a83db9eff60c06ba73c27307c357358f76679477782453c5
SHA5126d5c070459af13f9564514f975b0ed623518a9277d4bf359be8035dd3e15e81356017baa944042af9b8c61c78b659192aff624a262f41cffe2c282b67afe2eb4
-
Filesize
13.4MB
MD533c9518c086d0cca4a636bc86728485e
SHA12420ad25e243ab8905b49f60fe7fb96590661f50
SHA256ba30ea16cd8fbd9209d40ae193206ad00f042d100524cf310982c33369325ca2
SHA5126c2c470607b88e7cd79411b7a645b395cee3306a23e6ba50b8ac57f7d5529a1b350c34e19da69aeb1ffade44d5187b4a1ef209a53d21a83e9e35add10fc7867d
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98