Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 18:44
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
MEMZ.exe
Resource
win10v2004-20240508-en
General
-
Target
MEMZ.exe
-
Size
16KB
-
MD5
1d5ad9c8d3fee874d0feb8bfac220a11
-
SHA1
ca6d3f7e6c784155f664a9179ca64e4034df9595
-
SHA256
3872c12d31fc9825e8661ac01ecee2572460677afbc7093f920a8436a42e28ff
-
SHA512
c8246f4137416be33b6d1ac89f2428b7c44d9376ac8489a9fbf65ef128a6c53fb50479e1e400c8e201c8611992ab1d6c1bd3d6cece89013edb4d35cdd22305b1
-
SSDEEP
192:M2WgyvSW8gRc6olcIEiwqZKBkDFR43xWTM3LHf26gFrcx3sNq:JWgnSmFlcIqq3agmLH+6gF23sN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MEMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 4700 MEMZ.exe 5020 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 3084 MEMZ.exe 4700 MEMZ.exe 3084 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 3084 MEMZ.exe 5020 MEMZ.exe 3084 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 3084 MEMZ.exe 2960 MEMZ.exe 3084 MEMZ.exe 2960 MEMZ.exe 3084 MEMZ.exe 3084 MEMZ.exe 736 MEMZ.exe 736 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 736 MEMZ.exe 736 MEMZ.exe 3084 MEMZ.exe 3084 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 736 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 736 MEMZ.exe 736 MEMZ.exe 736 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 3084 MEMZ.exe 3084 MEMZ.exe 2960 MEMZ.exe 2960 MEMZ.exe 4700 MEMZ.exe 4700 MEMZ.exe 736 MEMZ.exe 736 MEMZ.exe 736 MEMZ.exe 4700 MEMZ.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3464 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3464 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe 3912 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5980 wordpad.exe 5980 wordpad.exe 5980 wordpad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 5020 4256 MEMZ.exe 96 PID 4256 wrote to memory of 5020 4256 MEMZ.exe 96 PID 4256 wrote to memory of 5020 4256 MEMZ.exe 96 PID 4256 wrote to memory of 4700 4256 MEMZ.exe 97 PID 4256 wrote to memory of 4700 4256 MEMZ.exe 97 PID 4256 wrote to memory of 4700 4256 MEMZ.exe 97 PID 4256 wrote to memory of 3084 4256 MEMZ.exe 98 PID 4256 wrote to memory of 3084 4256 MEMZ.exe 98 PID 4256 wrote to memory of 3084 4256 MEMZ.exe 98 PID 4256 wrote to memory of 2960 4256 MEMZ.exe 99 PID 4256 wrote to memory of 2960 4256 MEMZ.exe 99 PID 4256 wrote to memory of 2960 4256 MEMZ.exe 99 PID 4256 wrote to memory of 736 4256 MEMZ.exe 100 PID 4256 wrote to memory of 736 4256 MEMZ.exe 100 PID 4256 wrote to memory of 736 4256 MEMZ.exe 100 PID 4256 wrote to memory of 4404 4256 MEMZ.exe 101 PID 4256 wrote to memory of 4404 4256 MEMZ.exe 101 PID 4256 wrote to memory of 4404 4256 MEMZ.exe 101 PID 4404 wrote to memory of 4188 4404 MEMZ.exe 104 PID 4404 wrote to memory of 4188 4404 MEMZ.exe 104 PID 4404 wrote to memory of 4188 4404 MEMZ.exe 104 PID 4404 wrote to memory of 3912 4404 MEMZ.exe 107 PID 4404 wrote to memory of 3912 4404 MEMZ.exe 107 PID 3912 wrote to memory of 2692 3912 msedge.exe 108 PID 3912 wrote to memory of 2692 3912 msedge.exe 108 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109 PID 3912 wrote to memory of 3180 3912 msedge.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\MEMZ.exe"C:\Users\Admin\AppData\Local\Temp\MEMZ.exe" /main2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=what+happens+if+you+delete+system323⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe30e046f8,0x7ffe30e04708,0x7ffe30e047184⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:24⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:34⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:84⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:14⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:14⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:14⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:14⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:84⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:84⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:14⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:14⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:14⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:14⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:14⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:14⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:14⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:14⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:14⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13535747364789877002,10308348157729006691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2012 /prefetch:14⤵PID:5988
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=best+way+to+kill+yourself3⤵PID:2304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe30e046f8,0x7ffe30e04708,0x7ffe30e047184⤵PID:1744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+send+a+virus+to+my+friend3⤵PID:5728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe30e046f8,0x7ffe30e04708,0x7ffe30e047184⤵PID:5744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/3⤵PID:2204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe30e046f8,0x7ffe30e04708,0x7ffe30e047184⤵PID:228
-
-
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- Suspicious use of SetWindowsHookEx
PID:5980 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:1272
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3712
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4fc 0x4901⤵
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
206KB
MD5f998b8f6765b4c57936ada0bb2eb4a5a
SHA113fb29dc0968838653b8414a125c124023c001df
SHA256374db366966d7b48782f352c78a0b3670ffec33ed046d931415034d6f93dcfef
SHA512d340ae61467332f99e4606ef022ff71c9495b9d138a40cc7c58b3206be0d080b25f4e877a811a55f4320db9a7f52e39f88f1aa426ba79fc5e78fc73dacf8c716
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD558445aeba4bb5e176b094ed194d164ab
SHA116347fded7d5534a48281e13b86f70f0c42600e7
SHA2562b077aba0f27a25e294b24602e25a40390d6d7c6e5a308128582e78eff9e7562
SHA512b5f8335b635cc8a584c549ed566bc8b6bfe28a8cc33fd53a8466fa3ffe8ddc28f59a66b2c92f32cbb30263d73f4781c9065f340c3802a77c0c3c81bea81acc23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e2ddd0eba40b6f3710a94d7f1e634027
SHA12044a4d1f446cedc36d42e33b687c9b52e7ad713
SHA256958c016ca74b86b2458be9b1987b054865a6ea22dc1679432568d3718479574c
SHA512b2335832996e7ee154b7c24e03db7482a0c75580dbfed490d5026265ab4dec84f3dabe4ed43cfde1faf6205f94eb61ab63bf3f0a9384b4fbbfaa2998038c6c66
-
Filesize
815B
MD505c3d9791d26b19159ad0572a80c99d0
SHA1c9785087554de46615b64c79da3562c0cfb2035c
SHA2568ecde8b998bad9e5101064a28b677701405774b465b72a7552be2ef9605fdc2e
SHA51297933094b5c8723aa2e96978c44acd4357835d459e3f64cb99e963b871df42f1e25e642292d79d93a36cd9c65ca4b1e8cd5eaba9938b6376fc45078309ca3db9
-
Filesize
5KB
MD5537fe9ab90d8b2d974b3323aeb452734
SHA1f3697d77a502e6887ad8811b45f4ee50b5242e52
SHA256be875de659c541b089c8a0b6dace53927ca422c35e40fb9edb0e46f495f3d434
SHA512e7731e3b392a73e54f5c5dc1c3e95d7b6346b0d5900e0047cded1325fd236c2356f53e4fcb4949054b72bce0584ab8da41f56b5e1f1084a3c1a1ab8037870517
-
Filesize
6KB
MD5bf0660c40313eb19b82c29097ae5fd89
SHA1b4f201fff96a62278e8b434cc05e6cd7c64238f7
SHA25647cf76914b7924660341eb8299aa4e6b50fc63d60ac612497b0b36682de497ba
SHA5128fe872c10cdfe938d18c3fb8ee4628c13bec3e81a1d271a83382f84d13994e1899254d259a9f70872b1afad2ed52a07f0031cffa1c64cfe5325fffe0d0d3abca
-
Filesize
6KB
MD5c445e675f647a16e00d9088f7899b0e9
SHA1bbcb7671ded7341ac9f26daa1177dfe140ac2a7c
SHA256a72a597526f975dc9403617a9535325fc110875d4f3010a8bcf9090d87b5768d
SHA5126c781d02daff17893d97f505d5a3094d2ba28ffcc95feac274610217994748c6043cad84afe7844fd47d9b16d85759b4b9cf0c730b2e5e47b44711ab0148434e
-
Filesize
6KB
MD5d2ee6638fe90a146890b5df4167c398c
SHA1d5b7d0d93a4ef4b02aeeb4fd6a0ad12e0820cc64
SHA256399b96befa92c77cf37a16fb871293c23eb9f1bc7d5d477d8c3ffed74392da99
SHA51251ff608c8f12fc9f63a7cecb3835d6e912e9896a0abfe46fed8de76868fddac0577c8f3dab3c55159018cb0e7fddb38f471a5829fe0d22a43aa648754e874eb9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53d49ef4fc6a227fb1982975809efd97c
SHA10ded9c9664acc10c8c59afa416d2decf9793a00c
SHA256824e5d159a68d7b55802450e1d5582dcca4c514e36826aefafbfb77efde2bf5c
SHA51275c22739a67dbb674258ba426b736c77a689e442946a9b919898931213105566c8bbc90edd42646fbb5f251e5cca9cbc584b3ebad9b610f93dd13f8d1d61d062
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf