Analysis
-
max time kernel
294s -
max time network
298s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 18:55
Behavioral task
behavioral1
Sample
bebra.exe
Resource
win10v2004-20240508-en
General
-
Target
bebra.exe
-
Size
74KB
-
MD5
669e9e7f8c7290ffda453a62f14ca030
-
SHA1
4eabe1cb31a0c2ed609fcdef7a5d2ca0bfff328c
-
SHA256
58b0a1a32bd96f09ac520b8a7433cc86f0ac5c3fa1df4741dd8b2bd12713f749
-
SHA512
bbc310297435462479a6035e0522ce3da55bac7ca2b1fd77825a798b70f84edb4402405b25cfb33d0dad808570f6b1dab88f7699d0d4777a97465d8183075655
-
SSDEEP
1536:BKru/Ft/VKQWRdx0zaYEeqbGxkwfTlk6QUGH+meODiDDO1:UrWF1MpAEeqbG6IywmeOWDi1
Malware Config
Extracted
xworm
consider-catalog.gl.at.ply.gg:61770
-
Install_directory
%AppData%
-
install_file
bebra.exe
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/316-177-0x000000001B350000-0x000000001B35E000-memory.dmp disable_win_def -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/316-1-0x0000000000180000-0x0000000000198000-memory.dmp family_xworm behavioral1/files/0x000a0000000233d5-75.dat family_xworm -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3860 powershell.exe 4756 powershell.exe 3468 powershell.exe 3628 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation bebra.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bebra.lnk bebra.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bebra.lnk bebra.exe -
Loads dropped DLL 2 IoCs
pid Process 316 bebra.exe 316 bebra.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bebra = "C:\\Users\\Admin\\AppData\\Roaming\\bebra.exe" bebra.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\ bebra.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3860 powershell.exe 3860 powershell.exe 4756 powershell.exe 4756 powershell.exe 3468 powershell.exe 3468 powershell.exe 3628 powershell.exe 3628 powershell.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 316 bebra.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 612 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 316 bebra.exe Token: SeDebugPrivilege 3860 powershell.exe Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 3468 powershell.exe Token: SeDebugPrivilege 3628 powershell.exe Token: SeDebugPrivilege 316 bebra.exe Token: SeDebugPrivilege 612 taskmgr.exe Token: SeSystemProfilePrivilege 612 taskmgr.exe Token: SeCreateGlobalPrivilege 612 taskmgr.exe Token: 33 612 taskmgr.exe Token: SeIncBasePriorityPrivilege 612 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe 612 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 316 bebra.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 316 wrote to memory of 3860 316 bebra.exe 89 PID 316 wrote to memory of 3860 316 bebra.exe 89 PID 316 wrote to memory of 4756 316 bebra.exe 92 PID 316 wrote to memory of 4756 316 bebra.exe 92 PID 316 wrote to memory of 3468 316 bebra.exe 94 PID 316 wrote to memory of 3468 316 bebra.exe 94 PID 316 wrote to memory of 3628 316 bebra.exe 96 PID 316 wrote to memory of 3628 316 bebra.exe 96 PID 316 wrote to memory of 3472 316 bebra.exe 109 PID 316 wrote to memory of 3472 316 bebra.exe 109 PID 3472 wrote to memory of 3772 3472 cmd.exe 111 PID 3472 wrote to memory of 3772 3472 cmd.exe 111 PID 4044 wrote to memory of 4172 4044 msedge.exe 115 PID 4044 wrote to memory of 4172 4044 msedge.exe 115 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 3764 4044 msedge.exe 116 PID 4044 wrote to memory of 672 4044 msedge.exe 117 PID 4044 wrote to memory of 672 4044 msedge.exe 117 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118 PID 4044 wrote to memory of 4392 4044 msedge.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\bebra.exe"C:\Users\Admin\AppData\Local\Temp\bebra.exe"1⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bebra.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bebra.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bebra.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bebra.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\system32\netsh.exenetsh wlan show profiles3⤵PID:3772
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:612
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9fb9446f8,0x7ff9fb944708,0x7ff9fb9447182⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵PID:672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,14477608587876156481,2683257868301988888,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
5KB
MD5b5a1f7385dc35dfee9244cd72f1551f5
SHA10e43fb2ec6ef9c4b6be3eea2cb8d88cce9c8936e
SHA256c41773ed6a7d8973f8366cb5f02d8cb061637070a9761373066f006abe539c66
SHA512d3d60141a24005c0315cef1f7a593c142782f7c19aa04c8236ccb9f0e793ba63a1617dee5e9f1d339ce3fb2ea1143d7a902c79888345baf1976ad7ba6ae70ca7
-
Filesize
6KB
MD586bea0216a11065c3743b9f873fc73f8
SHA12e3aa34437da6dca32da5d048e3a76e100681ce3
SHA2563b5c938868580236a06c5c53269da53969560e67efa7f89d125fe720d8ece491
SHA512ed98537df7cb57b4dba6cb982b76f948e93ed2d8de98abf44e350c224e81d36220a6d94952f1c2186f0009e412ded4290cf6cf91cd02fd9cc9bcad5ac0c12bb7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD564ab0c701a84a7874cad5fc3bf55f41e
SHA16ae330d63b801271f5fba148cde4de56e979e5a1
SHA25649a76b4253c55ffae1849886facc7fd188c69eb5c0f0c2b861887f8c222cc2ee
SHA512dda60010932906f557ef0507dd0305ca3268917c5b9a0adbf694d3dd244bb3ab77aedab02f9fb552636247eb380c9413299877a318b42d7c8eecd17386b96c77
-
Filesize
944B
MD52e907f77659a6601fcc408274894da2e
SHA19f5b72abef1cd7145bf37547cdb1b9254b4efe9d
SHA256385da35673330e21ac02545220552fe301fe54dedefbdafc097ac4342a295233
SHA51234fa0fff24f6550f55f828541aaefe5d75c86f8f0842d54b50065e9746f9662bb7209c74c9a9571540b9855bb3851f01db613190024e89b198d485bb5dc07721
-
Filesize
944B
MD567e8893616f805af2411e2f4a1411b2a
SHA139bf1e1a0ddf46ce7c136972120f512d92827dcd
SHA256ca0dfe104c1bf27f7e01999fcdabc16c6400c3da937c832c26bdbca322381d31
SHA512164e911a9935e75c8be1a6ec3d31199a16ba2a1064da6c09d771b2a38dd7fddd142301ef55d67d90f306d3a454a1ce7b72e129ea42e44500b9b8c623a8d98b4d
-
Filesize
944B
MD5a80e3fed34f92f0786e5d0291c4b0c05
SHA125bf7cdae8604adebd717272d606285cd35c528e
SHA2561235efa1971a3233b95edcf295450036ae1cd71b794ba8939f3ca5656209d7d6
SHA512aaefe198c9150b44ccc11449bcfc9229d6825434f298ddcf5cd3508c38ddf6d3e664e1834073bf6e0b3c37e01e3602d10085a0929d2fbfd13b277e59924b7a09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
100KB
MD51b942faa8e8b1008a8c3c1004ba57349
SHA1cd99977f6c1819b12b33240b784ca816dfe2cb91
SHA256555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc
SHA5125aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43
-
Filesize
759B
MD500a9e96f94f73e7e3bb1b6a4ea4e730f
SHA1baa5de0127e60865cc90c06b220003d3d3723c56
SHA256af75efeba5ef963827b3bc93dd5d35aa77d8e906a4c115110a8049f3911a0fd7
SHA512a6d1a00e908839ec1e62e41e85230bd500cc89cce3b18b811ac669623517278d2949fdc24e4982f02066bb53598f758ad3fdc8ed74ca377ad0af1da96662c600
-
Filesize
74KB
MD5669e9e7f8c7290ffda453a62f14ca030
SHA14eabe1cb31a0c2ed609fcdef7a5d2ca0bfff328c
SHA25658b0a1a32bd96f09ac520b8a7433cc86f0ac5c3fa1df4741dd8b2bd12713f749
SHA512bbc310297435462479a6035e0522ce3da55bac7ca2b1fd77825a798b70f84edb4402405b25cfb33d0dad808570f6b1dab88f7699d0d4777a97465d8183075655