Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe
Resource
win11-20240419-en
General
-
Target
b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe
-
Size
894KB
-
MD5
b23386f85eb6c9bb7645ff3c913c018e
-
SHA1
3fcf5e2980972e9b19e0138575a1b607eab54927
-
SHA256
b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c
-
SHA512
b8f4bc5d84dd3235e9221dc3f7dd7264a8a5fc004c6e460ae1e3009e369c2483a954a2205512b679f53e2f9074ce85cea757bc97993b8e082193de7010e9f3cf
-
SSDEEP
12288:+qDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgaMTB:+qDEvCTbMWu7rQYlBQcBiT6rprG8acB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1412 msedge.exe 1412 msedge.exe 3912 msedge.exe 3912 msedge.exe 2704 msedge.exe 2704 msedge.exe 4508 msedge.exe 4508 msedge.exe 4924 identity_helper.exe 4924 identity_helper.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe 3952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 4928 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 83 PID 532 wrote to memory of 4928 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 83 PID 4928 wrote to memory of 3768 4928 msedge.exe 85 PID 4928 wrote to memory of 3768 4928 msedge.exe 85 PID 532 wrote to memory of 2704 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 86 PID 532 wrote to memory of 2704 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 86 PID 2704 wrote to memory of 1116 2704 msedge.exe 87 PID 2704 wrote to memory of 1116 2704 msedge.exe 87 PID 532 wrote to memory of 1984 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 88 PID 532 wrote to memory of 1984 532 b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe 88 PID 1984 wrote to memory of 760 1984 msedge.exe 89 PID 1984 wrote to memory of 760 1984 msedge.exe 89 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 2176 4928 msedge.exe 90 PID 4928 wrote to memory of 1412 4928 msedge.exe 91 PID 4928 wrote to memory of 1412 4928 msedge.exe 91 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92 PID 2704 wrote to memory of 2824 2704 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe"C:\Users\Admin\AppData\Local\Temp\b3b383a4345622758a2551ed9cd4dd950f7008c1d818e01b3a1b739db11a6b3c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce92446f8,0x7ffce9244708,0x7ffce92447183⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,8461404749281681301,5561241332152791244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:23⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,8461404749281681301,5561241332152791244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce92446f8,0x7ffce9244708,0x7ffce92447183⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:23⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:83⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:13⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:13⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:13⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3756 /prefetch:13⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:13⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:83⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:13⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:13⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:13⤵PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,1667394300701471650,3948650447340603252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6132 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce92446f8,0x7ffce9244708,0x7ffce92447183⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,6686664845048272368,5372748324882260506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58b167567021ccb1a9fdf073fa9112ef0
SHA13baf293fbfaa7c1e7cdacb5f2975737f4ef69898
SHA25626764cedf35f118b55f30b3a36e0693f9f38290a5b2b6b8b83a00e990ae18513
SHA512726098001ef1acf1dd154a658752fa27dea32bca8fbb66395c142cb666102e71632adbad1b7e2f717071cd3e3af3867471932a71707f2ae97b989f4be468ab54
-
Filesize
152B
MD5537815e7cc5c694912ac0308147852e4
SHA12ccdd9d9dc637db5462fe8119c0df261146c363c
SHA256b4b69d099507d88abdeff4835e06cc6711e1c47464c963d013cef0a278e52d4f
SHA51263969a69af057235dbdecddc483ef5ce0058673179a3580c5aa12938c9501513cdb72dd703a06fa7d4fc08d074f17528283338c795334398497c771ecbd1350a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50e56e87f02dfbb775ec6afb59e4af967
SHA166c29d8510c9a0ddee74d36568c021411ed4f34f
SHA2563d9e4bc3707f926682bca04889319610b716ad5835ba78db8f82af0d335648ac
SHA5129b5e2994c2181b66f3ceb914b9306170e2bca5479b807398e78a7323f873be5fecfe81378bb78deffc6000a37da82fd13b03fddbbea5231af8743ba322d68991
-
Filesize
2KB
MD50abfd88cbf1216bcfa8508f9bc1dc569
SHA1c97c5749d169689e932efc5e5e2b6f324e812173
SHA25620825ef5bd50be0e75013d033ee14a4edff239c729c49362895e124ac6d8a1eb
SHA5126b3e5d6418d1ca001bd6772016e5316ff1dc4655bff83f4b9263b401c3e28ab754807ece798ed5003b931da8407733add91cc79c36a5fad0e7c5ca3831ffc75e
-
Filesize
2KB
MD5c273d94f78c4136ef923ec3e9916c276
SHA17ceb2d2f936dac010940c06a7e16192e74814b92
SHA256ad2730c20a375cf3c26050abd315d9bce7bd7713c7f27e8bc6164c248cf92b69
SHA512e9a4d2e28f8b9bf0d1757edab835accf8bfc613008293d21918eeee5d068ad528d5cce414998d69252925bac198cea7ad52ccc97d04abe5a35bcccf0ffe25a36
-
Filesize
7KB
MD546c9525d9381752e3aea246a25c1a732
SHA1219abda36966b06a0f89a9855b222f56ce9780c1
SHA256427f090a4f99c40362f6c76974ad251180637622a39ec652445e9ba29f31c024
SHA51234206275bab525f8ca6155e0924494e70da096e1fab1306fda1c65921aa5775f5e53485cef698bb1e0fc8a69f4893070648b30d896b8e3037609bf925b6a6fe3
-
Filesize
6KB
MD57308c5bc655cd6669ac2445da935d56a
SHA16aaad4f4723b543ec33d98f11845185e09bb85dd
SHA25644f85da654798155211acac28944dd31a63bfd3d343e86a6ad78fd63385490f1
SHA5121b50c88422c1a35d6c7e57ce7a5d74f1b849adf37ddd126f218977243550eb0b93b3e4475713e5daa4d75808edf262fac406fbbac2df179d9a8bf936c11acc7d
-
Filesize
705B
MD5e7502503716a8939f7ecd9d6a948be24
SHA1898f46020d9125060956436f1ea0dfb3f87aa195
SHA2565c269a0f65de3da5728abd25f6eaaaeb107e9b71ec89d3ccbaaf600a8601f65b
SHA512c2a92d781a768af1380cb68872b59a1768ef331e0733cb68ef3a4113af4b23075ebef78ec38f877c3484d51d95e47e9bd50c5c721a35dc204f1082ffb13fdb7e
-
Filesize
707B
MD595cfe851eb958e6f325d927921fbe580
SHA1773d6f9346eac395fa528cf2dde025330c72f3b7
SHA2569859e21de642491ee54a75a26cbe080fc05ea67e7396bf8e3c751542ae3c508e
SHA5129c0f2f20741cf425b93d811f7a01b22cb684f861b9106e369701a1cece6d39d83c27623a14c8b286298ed29a58b487c17f733c22c34decba7ad6cb80b887f417
-
Filesize
703B
MD58297115462910bb15040aad3459722de
SHA1bf207e25db81010a3856aa564f81c28cc1316dfb
SHA256d24accb5289c25291e27cd18b69139dc6f02f3650da74155cbbc4e067301eecb
SHA5128b89b80b2f5da78fd6cce9a9602f03c7fb6c276769dd3881918802171988b34fad86217ab558ccda86a912d9095f1676935b17f3842a707a17cb7a73f00ded8b
-
Filesize
703B
MD5418dd262a75cad72fc5e818394323c26
SHA145daf80f9c91e18a550204ef4a2d62a63d1dbd9d
SHA256f68ace0030fa271992e4adf9a45689b38e46c2a34bb1b7d4b4df277af6927d8e
SHA512f98fc56b3678437c8c47434c4e7445dd6d7593f49da3a5a53dfe139fc489013143b400503499fa4f2a6abbcd200de9e5369fa8567d524a64f545862d774309cc
-
Filesize
707B
MD57498bd2c148997e0bd6eaa87c2446009
SHA18748d483cb1b5f562784d73d1710ab6269c6578e
SHA25696db8a0457ce222ef2e84a2aae210855fb1ed4ef2ff764a1bd228acd8821ca71
SHA51257c35bda580ee2222cbfdd52e72e94d69a30e8b30bea4e26b3ed2cbc2d1c95c89083c4e5225dbd66ea43062465b4e464f8c3b9b178036fdff4dfa07c64df1fdf
-
Filesize
703B
MD584fc44ea68c49fb8dc0f20b96211dd72
SHA1e388ce11f2685b269729c5036f416ca6c5fce581
SHA25665ada1e569290d53d6c64af4192c5049857ad6e971067a7250060fad1e5a8ed5
SHA51238205f2805382108e4a91a04ec79384985e0b4a70977bfd984643d03107d8f8c25c96f426df2675f4bcf849e493d2b29b23d22f4908e81271d4cf0f1cd6d3a7b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5e4dc7add6426cb026fec7678ad0b8d92
SHA1008dbc130665194f61cc5c199b89ada1c58233f1
SHA256ffbe3bce21abedfd02cbfe81ff5f1e0f861cd65a18c2229ae6015ea5e622ffae
SHA512ab7e63c03a1309751467634943efc1f7eb7d17800c371ccef785a3b0801cffdfe8f21d58962ef0365e94774c27b5a07fc7fd467feb4c01d813389dddefaa2ec2
-
Filesize
11KB
MD5f1b1f46691cdfcea868eb58f2bed155e
SHA11963f59980f8d0340fec09bac85b800a00f68d24
SHA256f0e91d6453f51ce077f13961221fdc112d677e53c00e8f81ba3dc78af659a95e
SHA512c0ae60d0fd3dc98b6a0c24e5b6f72012f921ac01ee75493ca5f07e33a4d06f9dc70ed814898b5d8d95dfa72ca608f6b77218150fc9cd4252e634d7a03e056047
-
Filesize
8KB
MD5f3bfd4f930e15121714f53d8cfe0895a
SHA1f3569b1866e075609ce2db73f0e753a44b274b22
SHA2566479607bb788bec35a3368b250ee1b9e65886dd9e3cdef1faa183d62c154e5cc
SHA51291fbcca7b00c30b53a1b98b25276cc2df087ab96a6b2df6c9c2a68653775f57e7a5c0ef518f4989f7732b87edc32b00f243e189e2dc56b9171b3e17da542fed2