Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe
Resource
win11-20240426-en
General
-
Target
b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe
-
Size
894KB
-
MD5
a8df8179730a97675c47db4fcc0dc789
-
SHA1
87cb3179503cae8548ae71f6d10bfff211779254
-
SHA256
b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3
-
SHA512
a30691f79cc611bf66fd03a9892ff41072e30e5e898d08daa4eefd3f26ca0cf3a06cc0e6cd3dfcd3bbc6643435e072b3b4e5ce6259082b5d70ee8be2056edc35
-
SSDEEP
12288:GqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4Tz:GqDEvCTbMWu7rQYlBQcBiT6rprG8aAz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3912 msedge.exe 3912 msedge.exe 1896 msedge.exe 1896 msedge.exe 1920 msedge.exe 1920 msedge.exe 5980 identity_helper.exe 5980 identity_helper.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe 4048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 708 wrote to memory of 1896 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 84 PID 708 wrote to memory of 1896 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 84 PID 1896 wrote to memory of 3100 1896 msedge.exe 86 PID 1896 wrote to memory of 3100 1896 msedge.exe 86 PID 708 wrote to memory of 2232 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 87 PID 708 wrote to memory of 2232 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 87 PID 2232 wrote to memory of 4740 2232 msedge.exe 88 PID 2232 wrote to memory of 4740 2232 msedge.exe 88 PID 708 wrote to memory of 5096 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 89 PID 708 wrote to memory of 5096 708 b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe 89 PID 5096 wrote to memory of 2496 5096 msedge.exe 90 PID 5096 wrote to memory of 2496 5096 msedge.exe 90 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 2972 1896 msedge.exe 92 PID 1896 wrote to memory of 3492 1896 msedge.exe 93 PID 1896 wrote to memory of 3492 1896 msedge.exe 93 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94 PID 2232 wrote to memory of 4732 2232 msedge.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe"C:\Users\Admin\AppData\Local\Temp\b8c38f7109da67fab663340401cbec4bec7e8a45ec2e4cb49e8b589ebe9115f3.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1a0246f8,0x7fff1a024708,0x7fff1a0247183⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:83⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2840 /prefetch:13⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:13⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:13⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:13⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:83⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:13⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:13⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:13⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:13⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1419642592016480331,4397606280895225407,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff1a0246f8,0x7fff1a024708,0x7fff1a0247183⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,9905176335124081445,14436261414294605485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:23⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,9905176335124081445,14436261414294605485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1a0246f8,0x7fff1a024708,0x7fff1a0247183⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,589184313368573244,16268844686680271026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5346d9d3376f28a75807fbe2e5314c8e2
SHA1f291aefc5cf7084c5f7c188a77449bd1d256fbb8
SHA25618e4260d5d88675b5a2357c127c3b802b613b760394f4ec02be6813cd35e6873
SHA512dd94582c90656b912aa72cc4c90b370c76ee5413c56b31bd35a9045286b53339e7258eb05af88afa053d02222dd52f0e02c304d8abad35e00f97c1c383460709
-
Filesize
1KB
MD56905912b8a8919353d27708d0473c06f
SHA167a4250ef825e285e630a3de15ec3f644b4b3321
SHA2567873ff6f2f046d2127f9e63f28e001d21be4b0c727eed167a1fda8822d031eef
SHA5126f188c2b2d59f455c2913fcc74b1eadf617443783def3c724745afa9cfd98b8b19749fea7187fd4f559410ee71e84b277c07bff37ca0b226325ec1e1f362669b
-
Filesize
1KB
MD5df441c507fd936389c2677ce28308000
SHA19ee1c45f01c77f6854d601b5bd20a7ff08fab0f4
SHA25610f88857e1ded3c980dc6631b75ee970d6116573ba5eb7f2d6fac55d5ca66bc4
SHA51221daa0780771483219cf3486b3b364647d1e8f5351e350241bd100c83bee427c716f8723338dc91806a33dda0fd0b9bc132c066592dc5242e144bce959b43dae
-
Filesize
6KB
MD5cea9b9b2ff0e69c8fd322f83572c304b
SHA14875d2181638896462b579ed42584a8c786e0eee
SHA256e45b5f1995c3a227821964b14eed95c9618122efc67b82a362041e75d82a46ae
SHA5121f27bb8dd2df3538d53f8eadc0f550acd4d43e52925ec0b257bc9e4aea0ad7b687552cb43a3fac3a750734c17d8f1834b6e9d171f2b47429c98dadc866394c21
-
Filesize
7KB
MD5a568be4e9157eb287e3e11b5ec153eff
SHA19ed03ad3d1984de3f515165c1165529411db5f38
SHA256ef269ce895251f42be2a0ae214e58a3256b07d7bf543362a54b6077f61640b15
SHA5126c02628e76fd82d50950bea44eaf89509117ebfda604d4b6fb2529792c5417b9f3fbae57a6c9d17ecc0ad313ef18470b667bbd6bf4c738b1b2c4006ebb045ace
-
Filesize
539B
MD533685613d67abe01165d252db149a25b
SHA13cef018e10ca7903e2cf7c18f16b19232f91ee9b
SHA2560f6ae950dc178002520258fed6f21844e050a279169e0f9d54dd50988e710066
SHA512fcd3467073f64b4d9a912e5fa1714ab6d213bcf1765b88f33a0e955532c3231dba2cf6ee35b3178509f82a3e1dfcf4091669f81f3b1d0f04b408844d57c0ebde
-
Filesize
539B
MD5f4c90bf19a022d9a40f1ea5b5446aa06
SHA133422c582bc13c99df26eba545bfa99e6d48547b
SHA25601a99a1a3cd1ac7ae1d925cc3f61961a239e70377d1a5ce00e4c76089275c421
SHA512c69a011b5c0fc62fc640227e7bc0a6705459ef9a0396b5d46cda8ae10c83900ea03620b60934d1aa89fa9d0117045157d2cf713d5d026ab4aed52091c99241a2
-
Filesize
539B
MD5cb21c964957c5d14db4a61df7222ba4f
SHA118278f20a46c456e87d4385623e25aa4cbb5b715
SHA25658e651d59f7d54077f68ffdcdd7f9ac815a133229c0abd609119a66675b2f43b
SHA512c5ffb387c04a61f9712d8376293327c5c27d63200e8fcb5e5d96ecfcf82dc4c03c4b3efd69d858424779f852057269bb9c58e59a79663b25adcb567702eefad4
-
Filesize
539B
MD5417bdca4ac9de3e920b1be9c476f0b92
SHA1c604d32fe573eee7ad48c9e66765700e6b162254
SHA25628c549ffbcdc98c171e3fc8c55917200a6612f345a6a89156dbd8abfda7c4b31
SHA512c6e1db7a2e6235bbcab73e151b8fe664c9bbdb275e7bf0fcff40ea5538daad099d41fde1b05b6c43375731850bf9d027712909035131f0054553ba65806dbeba
-
Filesize
539B
MD5b5d0dc426700a644ff74abbccc79a357
SHA1cad6884768c04351854551135345e5945216fa90
SHA256fb93ee2489ffefb2f28ead4a05b8618a3daaab8f667a1c9bf08452a99a04ae17
SHA5120a11912db8c101aca2c9699a2ea0890270d9ecb07739ca7db7c0c7c7421000382c4fd6c1b914687349f95855960aa332f729a43ee68e95eaa3768e2d9350e623
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5c7074956ebca4f3eadf52672e02ab30a
SHA10df73f6c068407915f1b1256422ec940cfbe671e
SHA25612cc55fe121c551daca07807b063175883a2f773eda586802ee34079cb76e6e3
SHA512a5a752fd82ab45b6ea2183ef3500baad49ae8324bca114a4cfe9e63a655f21066646294d74ff3ab6bf223c240fefe27b910d8bf80146f1d78564d6ff5f77cb7b
-
Filesize
11KB
MD5cd09e65d6aa42ed21d834125be352569
SHA1cbbd91e708d89db7c4bd6c654d20980e77751915
SHA25648d6b0d200b9c57f3be48a96915dfaf3c9c9fecbdc06c633d22d3b8bb40b83e2
SHA512f867e35138fe0681432efb0f5d285865c05e97324f91cb4375ef2349e29f4c48c3d83620c51d7f2166a2829d5328b1106fe8ec026995320777773deb9cb904db
-
Filesize
8KB
MD56831f3a382c6bfbba869fdec180b998b
SHA1fca359ca3de9fe8af7342b35f2ec98a91c0c8dfd
SHA256d1b8c10e8bf04ffb5751c191c908275c95d8f626f5c23495d7d0caa9039500a1
SHA512547a67b1fd67823215d9555422c8071c130d304d18dd8721cb41cb962a195966116be813be482599e861c1758e42c90eeeb75ef49c93cc2d340db165226c4a35