Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 17:34
Static task
static1
Behavioral task
behavioral1
Sample
8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe
Resource
win7-20240221-en
General
-
Target
8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe
-
Size
2.6MB
-
MD5
f72be57c47209af71df8b3d97c5206fa
-
SHA1
7a5d1ed93170e859d00e79d774ec479d228a8442
-
SHA256
8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b
-
SHA512
cfb6aca542d4fc524c6ca2fa42f8df49ba773781301f6da590d2b81f00e70482f2252b1c6bd7496aa6be32ae5fa9ffb63d0321fb99ad32e93e81187cafc0d35f
-
SSDEEP
24576:+A8vyrepIND/0bfSPdaYQRFo3UR+h+8fEvdDrGnrdEROGHOhBBoKpYC/hRJHOh:+A81IJPsqnEvdDqnroHOPHO
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\Y: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\L: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\P: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\M: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\R: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\S: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\H: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\K: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\I: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\Q: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\W: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\X: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\Z: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\A: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\G: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\J: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\N: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\O: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\T: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\U: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\B: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe File opened (read-only) \??\E: 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4304 msedge.exe 4304 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 372 identity_helper.exe 372 identity_helper.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe 3844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1952 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe Token: SeDebugPrivilege 1952 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe Token: SeDebugPrivilege 372 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe Token: SeDebugPrivilege 372 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 372 1952 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe 83 PID 1952 wrote to memory of 372 1952 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe 83 PID 1952 wrote to memory of 372 1952 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe 83 PID 372 wrote to memory of 3232 372 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe 96 PID 372 wrote to memory of 3232 372 8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe 96 PID 3232 wrote to memory of 4208 3232 msedge.exe 97 PID 3232 wrote to memory of 4208 3232 msedge.exe 97 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 1556 3232 msedge.exe 98 PID 3232 wrote to memory of 4304 3232 msedge.exe 99 PID 3232 wrote to memory of 4304 3232 msedge.exe 99 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100 PID 3232 wrote to memory of 3772 3232 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe"C:\Users\Admin\AppData\Local\Temp\8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe"C:\Users\Admin\AppData\Local\Temp\8ba53744181f10c1c94e4a4946dce7dd9d5451f173a1ac49f70568bd5cfd721b.exe" Master2⤵
- Drops file in Drivers directory
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.178stu.com/my.htm3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x40,0x100,0x104,0xfc,0x108,0x7ff926e846f8,0x7ff926e84708,0x7ff926e847184⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:24⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:84⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:14⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:14⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3956 /prefetch:84⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3956 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:14⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:14⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:14⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:14⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:14⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:14⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:14⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:14⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,2025851564297243394,1204362859195350087,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5768 /prefetch:24⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
5KB
MD56217a10f06df3b353a7c81ac077aa3df
SHA1ed50c87da0c3afa68681508bdf919a218df5c536
SHA256d93c874c4c715811cbde2671eb550588af3cc1eceaef0d9ad4a064213c11dd08
SHA512fcf20b0fae57ba8ff6c6c48f6d46b759d126c40417d8f3b0be098f299dcb40e1a3f47fc5e43ed012bb857addfce381ecd75d269a9f676a0df69d9cbb499b0781
-
Filesize
6KB
MD55f30b037b83fcafbe62380c9e5ccf30c
SHA1e506bf5bd2563a9bc8d4f754c8bb6ea9dcdb1f92
SHA256607662e328fbd532a876d3529c66ecdb27af456570e9a0dc40834cc876b1b79e
SHA51269febd784d4bd7647a92142620a6a68985fa79e317ebc8a4ae59a62423fea78336854851bb96c749f244d00108235470156af97f663df94a3065ec73cdc81e3b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5153eb6d4037ba29ae73daa2f5efe3111
SHA1931872b2a445cd03c347d472280ee42665aeaa3d
SHA256fcc7dcbe71fa00240acb7e6685bdddbecd4fde0edce680b6e0bb190f1a6ae2df
SHA512313dd800f4f045cc1c0e9a2e7b4d94280737baee59c1e3382ba3d80c42c3ce2ceac4814d10f69764e38fbfb191cb213c3c95f7922e73dddd5e6bb97726692b1e