Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe
Resource
win7-20240508-en
General
-
Target
508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe
-
Size
14.0MB
-
MD5
58ed8e68a96f66291f5ee1dabe5629d1
-
SHA1
14a50a50dcd67986cf489af3e8bdc9b44dae8f00
-
SHA256
508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96
-
SHA512
ca5195e7869b8af11c2258f10cc5aa306085a345838982545d7e5a3e818049dacd7dc3c7ecc6c0ca3e718586254a24f7ef09921d1441e95745ea7dad177d2ff7
-
SSDEEP
393216:j7IFUO++TLjEEElpFlpclpclp6lp6lp5e9nN6zYcJqUejs6F:f2TLWzJ8jsy
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1236-6-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1236-7-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5184-15-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5184-16-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/1236-19-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-28-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/5184-35-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-33-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-37-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral2/memory/4728-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 13 IoCs
Processes:
resource yara_rule behavioral2/memory/1236-6-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1236-10-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1236-7-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5184-15-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5184-17-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5184-16-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/1236-19-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat C:\Windows\SysWOW64\240598640.txt family_gh0strat behavioral2/memory/4728-28-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/5184-35-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4728-33-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4728-37-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral2/memory/4728-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatforn.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatforn.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
svchos.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Ö÷¶¯·ÀÓù·þÎñÄ£¿é\Parameters\ServiceDll = "C:\\Windows\\system32\\240598640.txt" svchos.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatforn.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatforn.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation HD_msedge.exe -
Executes dropped EXE 24 IoCs
Processes:
svchost.exeTXPlatforn.exeTXPlatforn.exesvchos.exeHD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exemsedge.exesvchost.exeTXPlatforn.exesvchos.exeTXPlatforn.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exeHD_msedge.exepid process 1236 svchost.exe 5184 TXPlatforn.exe 4728 TXPlatforn.exe 608 svchos.exe 5116 HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 3908 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe 452 msedge.exe 4408 svchost.exe 1900 TXPlatforn.exe 6052 svchos.exe 5016 TXPlatforn.exe 624 HD_msedge.exe 5804 HD_msedge.exe 2144 HD_msedge.exe 2236 HD_msedge.exe 3948 HD_msedge.exe 5416 HD_msedge.exe 2296 HD_msedge.exe 3988 HD_msedge.exe 5204 HD_msedge.exe 5732 HD_msedge.exe 2152 HD_msedge.exe 4380 HD_msedge.exe 4064 HD_msedge.exe -
Loads dropped DLL 3 IoCs
Processes:
svchos.exesvchost.exeÖ÷¶¯·ÀÓù·þÎñÄ£¿é.exepid process 608 svchos.exe 4056 svchost.exe 3908 Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/1236-6-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1236-4-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1236-10-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1236-7-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5184-13-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5184-15-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5184-17-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5184-16-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/1236-19-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-28-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/5184-35-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-33-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-37-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral2/memory/4728-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
HD_msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA HD_msedge.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
HD_msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName HD_msedge.exe -
Drops file in System32 directory 6 IoCs
Processes:
svchost.exesvchost.exesvchos.exedescription ioc process File created C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File opened for modification C:\Windows\SysWOW64\TXPlatforn.exe svchost.exe File created C:\Windows\SysWOW64\240598640.txt svchos.exe File opened for modification C:\Windows\SysWOW64\ini.ini svchos.exe -
Drops file in Program Files directory 7 IoCs
Processes:
msedge.exe508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe msedge.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe File created C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
HD_msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer HD_msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName HD_msedge.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exemsedge.exeHD_msedge.exeHD_msedge.exeidentity_helper.exeHD_msedge.exepid process 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 452 msedge.exe 452 msedge.exe 2144 HD_msedge.exe 2144 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 1136 identity_helper.exe 1136 identity_helper.exe 4064 HD_msedge.exe 4064 HD_msedge.exe 4064 HD_msedge.exe 4064 HD_msedge.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatforn.exepid process 4728 TXPlatforn.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
svchost.exeTXPlatforn.exesvchost.exedescription pid process Token: SeIncBasePriorityPrivilege 1236 svchost.exe Token: SeLoadDriverPrivilege 4728 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4408 svchost.exe Token: 33 4728 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4728 TXPlatforn.exe Token: 33 4728 TXPlatforn.exe Token: SeIncBasePriorityPrivilege 4728 TXPlatforn.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
HD_msedge.exepid process 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
HD_msedge.exepid process 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe 624 HD_msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exeHD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exemsedge.exepid process 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 5116 HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 5116 HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe 452 msedge.exe 452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exesvchost.exeTXPlatforn.execmd.exesvchost.exeHD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exemsedge.exesvchost.exeTXPlatforn.exeHD_msedge.execmd.exedescription pid process target process PID 1524 wrote to memory of 1236 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe svchost.exe PID 1524 wrote to memory of 1236 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe svchost.exe PID 1524 wrote to memory of 1236 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe svchost.exe PID 1236 wrote to memory of 4212 1236 svchost.exe cmd.exe PID 1236 wrote to memory of 4212 1236 svchost.exe cmd.exe PID 1236 wrote to memory of 4212 1236 svchost.exe cmd.exe PID 5184 wrote to memory of 4728 5184 TXPlatforn.exe TXPlatforn.exe PID 5184 wrote to memory of 4728 5184 TXPlatforn.exe TXPlatforn.exe PID 5184 wrote to memory of 4728 5184 TXPlatforn.exe TXPlatforn.exe PID 1524 wrote to memory of 608 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe svchos.exe PID 1524 wrote to memory of 608 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe svchos.exe PID 1524 wrote to memory of 608 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe svchos.exe PID 4212 wrote to memory of 3424 4212 cmd.exe PING.EXE PID 4212 wrote to memory of 3424 4212 cmd.exe PING.EXE PID 4212 wrote to memory of 3424 4212 cmd.exe PING.EXE PID 1524 wrote to memory of 5116 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe PID 1524 wrote to memory of 5116 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe PID 1524 wrote to memory of 5116 1524 508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe PID 4056 wrote to memory of 3908 4056 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 4056 wrote to memory of 3908 4056 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 4056 wrote to memory of 3908 4056 svchost.exe Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe PID 5116 wrote to memory of 452 5116 HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe msedge.exe PID 5116 wrote to memory of 452 5116 HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe msedge.exe PID 5116 wrote to memory of 452 5116 HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe msedge.exe PID 452 wrote to memory of 4408 452 msedge.exe svchost.exe PID 452 wrote to memory of 4408 452 msedge.exe svchost.exe PID 452 wrote to memory of 4408 452 msedge.exe svchost.exe PID 4408 wrote to memory of 1424 4408 svchost.exe cmd.exe PID 4408 wrote to memory of 1424 4408 svchost.exe cmd.exe PID 4408 wrote to memory of 1424 4408 svchost.exe cmd.exe PID 452 wrote to memory of 6052 452 msedge.exe svchos.exe PID 452 wrote to memory of 6052 452 msedge.exe svchos.exe PID 452 wrote to memory of 6052 452 msedge.exe svchos.exe PID 1900 wrote to memory of 5016 1900 TXPlatforn.exe TXPlatforn.exe PID 1900 wrote to memory of 5016 1900 TXPlatforn.exe TXPlatforn.exe PID 1900 wrote to memory of 5016 1900 TXPlatforn.exe TXPlatforn.exe PID 452 wrote to memory of 624 452 msedge.exe HD_msedge.exe PID 452 wrote to memory of 624 452 msedge.exe HD_msedge.exe PID 624 wrote to memory of 5804 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 5804 624 HD_msedge.exe HD_msedge.exe PID 1424 wrote to memory of 5040 1424 cmd.exe PING.EXE PID 1424 wrote to memory of 5040 1424 cmd.exe PING.EXE PID 1424 wrote to memory of 5040 1424 cmd.exe PING.EXE PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe PID 624 wrote to memory of 2236 624 HD_msedge.exe HD_msedge.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
HD_msedge.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\DataCollection HD_msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe"C:\Users\Admin\AppData\Local\Temp\508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exeC:\Users\Admin\AppData\Local\Temp\HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://support.qq.com/products/285647/faqs/886453⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\\svchost.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\svchost.exe > nul5⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.16⤵
- Runs ping.exe
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\svchos.exeC:\Users\Admin\AppData\Local\Temp\\svchos.exe4⤵
- Executes dropped EXE
PID:6052 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks system information in the registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9959646f8,0x7ff995964708,0x7ff9959647185⤵
- Executes dropped EXE
PID:5804 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:25⤵
- Executes dropped EXE
PID:2236 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:85⤵
- Executes dropped EXE
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5416 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2296 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:3988 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1928 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5204 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3764 /prefetch:85⤵PID:5648
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3764 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:5732 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:2152 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=renderer --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
PID:4380 -
C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\HD_msedge.exe" --type=gpu-process --field-trial-handle=2068,16227433847376806347,15110188686340735441,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5184 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵PID:5060
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Ö÷¶¯·ÀÓù·þÎñÄ£¿é"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exeC:\Windows\system32\Ö÷¶¯·ÀÓù·þÎñÄ£¿é.exe "c:\windows\system32\240598640.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3908
-
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -auto1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\TXPlatforn.exeC:\Windows\SysWOW64\TXPlatforn.exe -acsi2⤵
- Executes dropped EXE
PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD5ad8536c7440638d40156e883ac25086e
SHA1fa9e8b7fb10473a01b8925c4c5b0888924a1147c
SHA25673d84d249f16b943d1d3f9dd9e516fadd323e70939c29b4a640693eb8818ee9a
SHA512b5f368be8853aa142dba614dcca7e021aba92b337fe36cfc186714092a4dab1c7a2181954cd737923edd351149980182a090dbde91081c81d83f471ff18888fe
-
Filesize
4.7MB
MD57833c63afd6c38927ec6b66ec18a2f8f
SHA17fbd7b8ba7eb611df17ed2363ad7fc4b07be0432
SHA2568f31934a63450e1d92332c3823e81187fb260cb6c5d4742ad46572e1c75398c8
SHA51268ced9bc9d1f9b16f6656b63274249e09564c9843d477e81214f7d0be291f0ac17fdc8140b2b43a5b0e90da5af602cdd94a3c568c1958a45d094bb0754c53a40
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
5KB
MD5f9b7d4a31384a835b9dd5a82eb33312f
SHA172085055bdaf3ee96d092bf44908ec1852d0fd74
SHA25600cb9cf652b3660406b558a7a3870af57b22b37a70c1205585a21646a8fb9640
SHA51272b6791cc0744996120b24817bdf5f459d9880b8b713609f1cb470ba0ec708c3bada7620fbc4e82ec4a5ce4254d138511c21e5d98b44156c327cae328f647cd7
-
Filesize
6KB
MD534f6487672ecd106b3dff1c442ac6d54
SHA17ed6cbc4292d019eb5d842ff24649af258b9a5a2
SHA256354409c8dbb7cb0115e275ec8259d0828911bfd112ebd0807e912af95fca0dfe
SHA512aa590973d8532a8af3db10e8d9db5c99767397bb8d6860f0b37f8f74b4693bf69a945301cf369202ecd62ba105d100c5427da9526bd47ea40f6e67b62608101d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5355b6148af6b0194c169dee4d47de01a
SHA122fcc7b714f8e3400d318c8ae29a313018638e16
SHA256b9a0374d26b6cbf110cbaedf33ccb66dd8c90444255eeef1b5a4aa92ec98339c
SHA512f5baeb5aa87eca58356521951b571a46c0bce3d0083debee6b13575b69b868c086bb1e91b1fbe760f9cf87d0cbe0d308dd21d5daa024462928337ca1ab30e242
-
C:\Users\Admin\AppData\Local\Temp\HD_508a7e5c5be104649c9124bb5b26de46f2b99a6481041e7462212d6d5db32f96.exe
Filesize12.5MB
MD5ab5e6b6b4d64a08b7daeca9e8cbfc0a1
SHA1929aac76bbde2bc56ba4b644895b44efc63c68d5
SHA2565b142673c19eed6f5b7023eeaba3585784f6d46da8746d5c2604a1a1b1f7f409
SHA5126523f5d8d6dd9aa8a8793e856c4629b5d664659f1193123a890e74ca86dc90e60099bcbd7d3f69f93bff5b14808eda3c3ebb9808de3bbd68d513645a9a071441
-
Filesize
1.5MB
MD56e63c6b990dce1307432d21aa52ec946
SHA13c14653ed90f7201e7acd329a31a4050aae01998
SHA25621d91ffeea7893738543006d409964139aae06428e7ccae1e73555ff4c81f44e
SHA512989e55bc8ef4f05f945ebe44db3a9701a195d1ba35c2cdf848ab1205d61fc4035593bd753377cd2f4125f7801276520accb297e633cd32d1cd1faceb6e9130d4
-
Filesize
93KB
MD53b377ad877a942ec9f60ea285f7119a2
SHA160b23987b20d913982f723ab375eef50fafa6c70
SHA25662954fdf65e629b39a29f539619d20691332184c6b6be5a826128a8e759bfa84
SHA512af3a71f867ad9d28772c48b521097f9bf8931eb89fd2974e8de10990241419a39ddc3c0b36dd38aac4fdf14e1f0c5e228692618e93adce958d5b5dab8940e46f
-
Filesize
377KB
MD5a4329177954d4104005bce3020e5ef59
SHA123c29e295e2dbb8454012d619ca3f81e4c16e85a
SHA2566156d003d54dcf2ee92f21bd6e7a6a7f91730bd2804381260bcabe465abe6ddd
SHA51281e9d456a4abfc7cd9e0943d4a0ce15523362c3179f3368381d1d7974f80a9f9113b5404b96e67e91684e0ea1895b7d0073e4c48d0bfc4fd0244b1af6acf0208
-
Filesize
50KB
MD5d84b73601c8f3cac7f242b7c0c117441
SHA16eb20ccc77fdab9191cc1c19f88c042fc74c44f1
SHA256768416a41166f5b24dcd85eeb2e0251499b0fafb5c87554885a46dd90fba993c
SHA5120c93ff5eebb2e92c778dd173a6b50f5aaa565724aec11e8f4962a185dc96e3057f8e66ec1d27b5ce61b4664395fa461e42f38292894d60ef4fcd28700ab1ffef
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e