Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe
Resource
win7-20240221-en
General
-
Target
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe
-
Size
2.6MB
-
MD5
84f597a0b9962fea5259cb95536d0c76
-
SHA1
86bc5b0a8a874c75f8b0cdd517bcb63557919bae
-
SHA256
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8
-
SHA512
014c4c553848dc523332fd06c4009fd10c254f85ec654a991f8abb76ab1cce1d126243ad4b365b35afa24ceb486b1a12f084f0f906f72aed7a9a79113acae985
-
SSDEEP
24576:9A8vyrepIND/0bfSPdaYQi5YYR+h+8fEvdDrGnrdEROGHOhXBo7FC/hRJHOh:9A81IJPDmEvdDqnroHO9HO
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
Processes:
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exedescription ioc process File opened (read-only) \??\A: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\P: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\R: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\T: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\U: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\V: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\W: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\G: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\H: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\I: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\J: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\X: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\Z: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\B: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\L: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\M: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\O: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\S: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\Y: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\E: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\K: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\N: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe File opened (read-only) \??\Q: 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4976 msedge.exe 4976 msedge.exe 1632 msedge.exe 1632 msedge.exe 5092 identity_helper.exe 5092 identity_helper.exe 5884 msedge.exe 5884 msedge.exe 5884 msedge.exe 5884 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exedescription pid process Token: SeDebugPrivilege 2004 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe Token: SeDebugPrivilege 2004 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe Token: SeDebugPrivilege 3080 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe Token: SeDebugPrivilege 3080 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe 1632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exemsedge.exedescription pid process target process PID 2004 wrote to memory of 3080 2004 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe PID 2004 wrote to memory of 3080 2004 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe PID 2004 wrote to memory of 3080 2004 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe PID 3080 wrote to memory of 1632 3080 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe msedge.exe PID 3080 wrote to memory of 1632 3080 4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe msedge.exe PID 1632 wrote to memory of 3600 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 3600 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 2312 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 4976 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 4976 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe PID 1632 wrote to memory of 1592 1632 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe"C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe"C:\Users\Admin\AppData\Local\Temp\4ebc7c786be937a2504c692f2d8fbf74c6adb85f523fe59da7f12236f0d845e8.exe" Master2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedaf446f8,0x7ffedaf44708,0x7ffedaf447184⤵PID:3600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:24⤵PID:2312
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:84⤵PID:1592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:4820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:14⤵PID:2368
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:84⤵PID:3144
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:14⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:14⤵PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:14⤵PID:3248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:14⤵PID:3384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:5468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:14⤵PID:5556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:14⤵PID:5920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:14⤵PID:5176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9632088123480710655,3163362763873896577,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5d6453a6f28f0b72f512c0d4a6dac5de7
SHA1b2391a6601da9347913f4f900f812bd32aa76984
SHA256cda9140eaaa74978747128b9c9adaf51b4a7c9532c6c9715d2d4b7f59c23522a
SHA5126ba57cb5c896b44ba83e50a8f2abb125d88dd48ad223067f92d2c9211be99eeb977c588c7571d6089dc299bf74241bbb4f6d0768852ec29cbd228111f06d494d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD51f4cd8af45244f5bb45b94a51ca55c10
SHA171c8fab50d9a77ff3dd38cd213cdc0e83b636a4d
SHA256ec2696260461af56cce32dd3501fd87b7904c57650ef525f031ea64dfd3db076
SHA51286b3df1f93eb03ea41af92a08950a7a70bfd814acaa9ad884c2bccb515987936bef2f49411d36ad106320861fa8d92b8c334ed84c25da607867f7f7fa8b2814c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5a950427414116430d1bf87c9c91d7de2
SHA177d2c545caa7d367689438881eb436c28c6e7dd5
SHA2562d1d7d905a8ab92eef29bb758b3e9f6ca0f1b1e9ba8c81735c6d3df93582a031
SHA512eed38b98ebb3bee7a19dc9f08aa3ab125a90266bc9f55eb96f7c61905cd447c648d1dcf913b331a1ee42184acc0321ca5a68cd3fa643952929d3c1ba9399000e
-
\??\pipe\LOCAL\crashpad_1632_TWJSONLPKAGATULQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2004-0-0x0000000002490000-0x0000000002491000-memory.dmpFilesize
4KB
-
memory/2004-1-0x0000000000400000-0x000000000069F000-memory.dmpFilesize
2.6MB
-
memory/3080-2-0x0000000000790000-0x0000000000791000-memory.dmpFilesize
4KB
-
memory/3080-5-0x0000000000400000-0x000000000069F000-memory.dmpFilesize
2.6MB
-
memory/3080-8-0x0000000000400000-0x000000000069F000-memory.dmpFilesize
2.6MB