Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-05-2024 13:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.pottershousechurch.ca/luxury/odc174466P0d08/
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://www.pottershousechurch.ca/luxury/odc174466P0d08/
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
https://www.pottershousechurch.ca/luxury/odc174466P0d08/
Resource
win11-20240508-en
General
-
Target
https://www.pottershousechurch.ca/luxury/odc174466P0d08/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133609453480276979" chrome.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 552 chrome.exe 552 chrome.exe 3020 msedge.exe 3020 msedge.exe 1264 msedge.exe 1264 msedge.exe 3124 chrome.exe 3124 chrome.exe 2792 msedge.exe 2792 msedge.exe 3376 identity_helper.exe 3376 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 552 chrome.exe 552 chrome.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe Token: SeShutdownPrivilege 552 chrome.exe Token: SeCreatePagefilePrivilege 552 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of SendNotifyMessage 28 IoCs
pid Process 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 552 chrome.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 236 552 chrome.exe 79 PID 552 wrote to memory of 236 552 chrome.exe 79 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 4308 552 chrome.exe 81 PID 552 wrote to memory of 736 552 chrome.exe 82 PID 552 wrote to memory of 736 552 chrome.exe 82 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83 PID 552 wrote to memory of 2012 552 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://www.pottershousechurch.ca/luxury/odc174466P0d08/1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff83ba1ab58,0x7ff83ba1ab68,0x7ff83ba1ab782⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1504 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:22⤵PID:4308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2088 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:82⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2148 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:82⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2904 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2912 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4304 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4436 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1760,i,3194767753020938277,15056629872907630484,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff827a83cb8,0x7ff827a83cc8,0x7ff827a83cd82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3300 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:12⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,1426344406367305230,3298482599719064297,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2972
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336B
MD5cd101763725e92840d24f17371f7b02e
SHA1a55c22f84463f64437f18f5149d17edf8a1465bb
SHA2567e7723764715e84a2035b57590ab829ff4c95d6e91569e7c4bbf0843c3bbd517
SHA512d832d23115064cd0a1fd0421f0e1af926a17c824bc3468f6975b8e8790779456b11b9d7ae3e0ba466b7315a2a7b9a872fa0e8ae63eec06624a6eb629a867ad78
-
Filesize
336B
MD567ad7cd9083ff5456f220a17ce95ab88
SHA1f5f323d51eaa73d69379fc98229952c6f7331fe4
SHA256f33dc18c905f015747343596bddeb3b94fb4c08a212e172d7470c7b7ae820a43
SHA512a4c28a835ff1400eb3a6ce1f451c1224ba41e40f9978558c68def2e3519a8f00223990fb0ca8a2f753e67abe7ab86763423384a4ec5b127f94d6c62a548eae86
-
Filesize
2KB
MD57e0d6c24164583973a125923ee867c20
SHA1d785ec9707235768fe14981a30965405655cc84f
SHA256ce244afd247e8e79dd2fb4e5805d3134956ef98eb90733d507da0473b7d25786
SHA512d63f33ca95198e9ec2186e5610ac76b0c7a4f00c964795dc7433daac7577685ecc8ea20dec97c338d1fb09d00c987e0e18b2ab32f811629470684aabd5797dbc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5fa732d3c7e7ec505c5a610d7e6b60093
SHA13afafd30c82453c5bef0113d0ab5ae62daa56cce
SHA2562ff3d906bb3f7361ad4a76c5b34e45a259352af0f1f23178dfb8b62b0ebce4d8
SHA512b40f29cbcad16c03898f261a951286e754769e743a853b60853e472816207f56496afc19902b78dda0b6d7eb935f15efb4d22eafdfac562d6fd7bfe5de67e1fc
-
Filesize
7KB
MD59d8e637b7d98db4c9a3ec32d148a84a5
SHA154a88b2eaa41057e4d284a3f265df4034dfc5ea2
SHA256037959b214fb08cf1a685eff3f766588ba8dfc31eb34123d06f64fe7d71048ee
SHA5120a33eaf0ef069da3c4d998dae1474e125054477bac99a59001283c8e82cbe8bfb25f62db62d0df0264685a7eeb7666eb69e41263135ad993753a96c09a3ee58c
-
Filesize
7KB
MD512aee6c05f1b1e8dc432c5b71849bab3
SHA131b2f2609f4fcd9a4cfe9d2dbf2be00633449c96
SHA256663d48e773e139629926725a01c67e947f137923c788d2e8eaf9c4785b2468b4
SHA512a01d5bb9c14d7d064e111ccb48a2a3f48649b573731fe15872314461259264765c0c64690b76fe19cc4b5869c300c45eeca683dc34aad1f61fbd5713fe747e68
-
Filesize
7KB
MD5f73df240085d4820e35c5d1d54e569d7
SHA1b2e045d8b88fc451d5b7a6ff76426f7f986aefce
SHA256a3938cc214f15fe91c54074c6102273f0c336d9e05630fe9accf8a593e16795f
SHA5121ba2f32238f52a484f2901afe98e6d1789583a3a5f4ea7315ffc26dd39ba9baec0d037da96996ce1d97ca232712f519bf0b74bd0f91a5f6849d427928f79e2fc
-
Filesize
7KB
MD5854e55c094900fa32e54a17008244a1f
SHA18c8b12aac1046c8c8bc78a2faabd9a848c2546a8
SHA256f55aca62865713ef16d52124840cd8ccbead914a3c103ae867ea6fe54e9379fe
SHA51289f5139902480016e31b76a76deb77a93fed14896a26023021cbd003bb3fe1c132b15674cd3358012c70b8ccd90a53335412e3cb91a5d2fc2911209042b43209
-
Filesize
129KB
MD5558bc0ced1cd1cad6bba35e1b5888ed5
SHA1964634c05f44f708d379298f3394b7dc6a74f2f1
SHA25641d796f47198582b3e420d80e93e7343a7bab7e353255621ca5f500151a62d3b
SHA512fe2e5da518fee72a71953e3a8a69e5b0b3fa3da8001e3578e63321aebcf5932a430f1cd50321f892192133fb701a1f72c858b140fa46c9275aee0c3c0a999bec
-
Filesize
152B
MD58294f1821fd3419c0a42b389d19ecfc6
SHA1cd4982751377c2904a1d3c58e801fa013ea27533
SHA25692a96c9309023c8b9e1396ff41f7d9d3ff8a3687972e76b9ebd70b04e3bf223a
SHA512372d369f7ad1b0e07200d3aa6b2cfce5beafa7a97f63932d4c9b3b01a0e8b7eb39881867f87ded55a9973abea973b2d2c9b6fc4892f81cec644702b9edb1566d
-
Filesize
152B
MD5390187670cb1e0eb022f4f7735263e82
SHA1ea1401ccf6bf54e688a0dc9e6946eae7353b26f1
SHA2563e6c56356d6509a3fd4b2403555be55e251f4a962379b29735c1203e57230947
SHA512602f64d74096d4fb7a23b23374603246d42b17cc854835e3b2f4d464997b73f289a3b40eb690e3ee707829d4ff886865e982f72155d96be6bc00166f44878062
-
Filesize
142KB
MD511dbe289ed434703846ff1558a9bcba0
SHA11ca7ed8518bba8958f0f6d630c0ae75750ef0125
SHA2567e0f62bca114702eb421b5f4ca91c5930bcd7ca66e3977318e55920038ba641a
SHA512a3dce64bff59170c8c6131e9e20fd22d336882e0e0601fb31c5be556d849647363883069943e95bad2141a7b30de8e8d8e850b9146bf50fbd82ff2f6d2af0733
-
Filesize
5KB
MD57a90e88995f979eabaeac15b338be455
SHA1120bd36267b8d0c93c678cd1ae36f31386defdf6
SHA25641d497fd99b68ee49102bfed390db7ab9aafa8ef8f7b1e25e596c854bbe14b28
SHA5123051c0a9e4d0e580292f4075fb8eac7834acbb4d55b874af209d1b75a5d1ba7d2b8edbbd1cc34a4c319c33766dc8574360e39488369b6e0fa3e1e27cdb30fb34
-
Filesize
5KB
MD594ab6ac692072bcee283c4921780453e
SHA1c9c834199329ca2c624e23e6fb0ed72c644b28b7
SHA25697583f0873c2d1fd048cd5263f722042ea0ef7df9af94dadcf60d3c79bb0c601
SHA5129929f9bd9f6d2a105b6aae180bc4bb36b6f5fbb04f9d1457c3b72211d2f52bd1802b2f004c81686ab83006a31b713219a8beb76d04e86109d5f9ad2de1ac0b41
-
Filesize
5KB
MD52e119b416dd80480f26117f8599803c3
SHA17ad2053b9e61759c424b6a0697e84d1cbcba1507
SHA256b4264b3baf480db7e055c923079083147840884ff2f076695b06f154f607aae4
SHA51278772067fed6de42442a2bdf79c8e8ca8f9ec93f7ac9dcc44709977664e158cb94100c1ebeda4ca57360bb88fd963f38bef7275ab0b6b005aa29ffad55103a0d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD58410db99364242413bb7295559c10c0d
SHA1d6be611a63937d01bc8b18641300965406ce7471
SHA256a64a2667f485275cd5a99383b43a67b546067c6acbbf09cde74d5277240d755c
SHA512a8924bf6d8880409bfaa2029e76c247b5a8ffb80df77f12993c15a548e860c8ea1a5a69a92212697ec110d71673e7b39df7c6ee5ba837484c40933f072368347