Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe
Resource
win11-20240508-en
General
-
Target
b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe
-
Size
894KB
-
MD5
1bd6838e07a93097f9c289910a6983f3
-
SHA1
cdda980d50c9559141efdb3a7410e1169314b2f9
-
SHA256
b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440
-
SHA512
c9aa3801455848ac391a8049dc876a25fca73c649eeb201c6225de2fb5baaea9bcf1e8c20e34b7e151139e7d40ed7b1b5babbe1e8d340e05d1d0e8f377658b42
-
SSDEEP
12288:WqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga4T5:WqDEvCTbMWu7rQYlBQcBiT6rprG8aA5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 4932 msedge.exe 4932 msedge.exe 1436 msedge.exe 1436 msedge.exe 4556 msedge.exe 4556 msedge.exe 1528 identity_helper.exe 1528 identity_helper.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5048 wrote to memory of 3216 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 82 PID 5048 wrote to memory of 3216 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 82 PID 3216 wrote to memory of 64 3216 msedge.exe 85 PID 3216 wrote to memory of 64 3216 msedge.exe 85 PID 5048 wrote to memory of 1436 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 86 PID 5048 wrote to memory of 1436 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 86 PID 1436 wrote to memory of 2396 1436 msedge.exe 87 PID 1436 wrote to memory of 2396 1436 msedge.exe 87 PID 5048 wrote to memory of 732 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 88 PID 5048 wrote to memory of 732 5048 b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe 88 PID 732 wrote to memory of 216 732 msedge.exe 89 PID 732 wrote to memory of 216 732 msedge.exe 89 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 3660 1436 msedge.exe 90 PID 1436 wrote to memory of 4904 1436 msedge.exe 91 PID 1436 wrote to memory of 4904 1436 msedge.exe 91 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92 PID 1436 wrote to memory of 1312 1436 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe"C:\Users\Admin\AppData\Local\Temp\b578785e319ade86eca6055c6ebf686084b87b08ddbdb8dbbb166e3f755a0440.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x9c,0x108,0x7ffd4e8c46f8,0x7ffd4e8c4708,0x7ffd4e8c47183⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1507889024558086625,5339083205210070532,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:23⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1507889024558086625,5339083205210070532,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4e8c46f8,0x7ffd4e8c4708,0x7ffd4e8c47183⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:23⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:83⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:13⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:13⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:13⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:13⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:13⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:13⤵PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:83⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5836 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:13⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:13⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:13⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:13⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16749130082650357575,13202974294055479517,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4e8c46f8,0x7ffd4e8c4708,0x7ffd4e8c47183⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,3284919056461200006,10715411683403801193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5c719fbe1caa80031c84bfbef8d8edbb2
SHA103ec0ba81ad706c1e565e516b401fa01711303b9
SHA256cbf831835aed805c8406452b23e06f814d7e17a60dd001b663be8e0eae31b768
SHA512a2e451ab3173691e538ff00d78ef1a2a6e8eded25754c6c1258d9de66c3accc8d9d895be86a7fc4df8f730531417475879b3033cb5d850e279d7c69a8af90a07
-
Filesize
1KB
MD5da64274fd8a797860302ff9803015a6b
SHA1de87e539ca663df11a8e7bb43443076162a502fe
SHA25690f09a9071cef92f035cbfc4173b40020f2a12057ad3ec3828896eb730c29d1a
SHA512327bd89bf0948db9840dee5520a0b3bc8bbc039d8e61bb6c49f595c27f342efefe721c82011ad96f8426ab8d437223db654e47e2c5c2a5efc52a6d2b6be11b1c
-
Filesize
1KB
MD5e88983330d3e612683c58d7a60c25e85
SHA11b5a03d15e8da986f8d9a024b9c7b524b8dfe451
SHA2563d7ae6fa49e7c44ae02803ff548eb77601fe6d83052afe79e3682133c1b0108a
SHA51251dd0c69d1ecaf91c8035555a63ffb501cc29f1e8d663b0e9f66b1ed605d00656cb236e0f6ee47dc6010fde9ebe459922c5d5628115553ff68e2c19863d4dbde
-
Filesize
7KB
MD523347247794a92a08c202ab8ae360d70
SHA1a52918ebd00608fbb8c5e4047b59103055ed0065
SHA25653e246d6e3335e113c3e7dfd74ca33792506d057364d1e3278f723b44629d56b
SHA512736b298d13fe721f372225c2846774879602635a276d419bdea69819dd8a3e50dce1ce3487e74b990ec1fe0e68043f98ea4b5c3f3bd089854e431c35a6560ebf
-
Filesize
5KB
MD54faac2d9472e22872dbec5bf80c7e896
SHA1fb983760b4f522a225dabf3d501defb57e21cfbf
SHA2566fd830540e0307ba42ef53b966ef9acbcfd3d83a5491f4f846d8e3045223b197
SHA5123bf2a3bcdb470400f08b831ea26be7db50def3aedb8b7075c83076b6f3ca5ca328789d6d8e3c8e4f9ceebc27c332cd61a93f02d85fc567a5f726b78419acedaf
-
Filesize
539B
MD5195fa4f042208422336de1297d0c1d51
SHA17da31bce557dd7ef5b3b1e6b64275f010098bf49
SHA2563374745e4adcef301d046546973b0213ed37522bd08959df5af7df607d4f514c
SHA5123ce44c82cb46f872320b7b15a8dbf7a26abd91cfd69abc642012996d99633a0276e1b34db40e270cd63396b724e16fcacdeb56fc1ddc0ac4b1df9b42a6dfbb47
-
Filesize
539B
MD5e40c88e6985cc6efc3582c2bc3245b35
SHA1efa8afa684b9748ea47ce9d14265e9444b9d3cd1
SHA256c5c85ee579e827ef047540facfffa659a1f5ced6b78a4b6c48d24aec163dd7ab
SHA512b62e308c7d6a4608c2011568004d75ef2f6c60b7cde54d5529980ba3bcdad18cdd065aa3e72b3366e1df9ee6bedcc8131cdb38b45d384471e13035cdd29968cb
-
Filesize
539B
MD5701bd74dd41f9d261261d3f2648de83d
SHA1f401bbaa8391843d83c534807c559e7654791080
SHA2569e1b67f5cd2b2303d89d52f8a50206d8339b533ec4d2f449baa05fe66c182f8f
SHA5126a7f3a7fc923190c2e75bcd204d68cdd55aeac30f96126a8feda75c40858d38a39f7aee8812c35be54b8b5d9a17a2f6cb0cbed75ff8be46e50aadd885c5a0c8a
-
Filesize
539B
MD54976ecb524b3951008400ec735010b34
SHA1c8e719b8865f617f63e5c101980700b31b8687f5
SHA2567d348819d3f6cf97e5eeac897cf9340a24f10e6031331db5ba26c2737e00ec87
SHA512ae84d1f0454ae355ea287bab5b251a671fa0b3542e35ae820a405ac14dddc6b9c6f15d6fb1ca94890b8a730dfee4d12b964b0c290b36a6a1a10fd30acc675020
-
Filesize
539B
MD54307c753e16eb50ae0165287730d4e08
SHA1fc9cbd987504d1e97e38538d0e93474694a3cbb6
SHA256aa5edb41c623727bfcb6604227aae14a546fb7a9af681056d8538057b21f9991
SHA51258209499c21f70feafbbc11c05ccecf21ae53ed7b9a0691acf875db2879207601a4042cd021bdee844603fa87e5a6c47785297f6ebb6ac6e20b49e30953d043c
-
Filesize
539B
MD5af0b0c6cbfa65a3bf62bae4dc53c4a0b
SHA1ab50b1d307adc80d6c697643da1654cb626ae576
SHA2563e5f4da5cc3eee40a2967866ecde4d6a618e9917b6ac64e4042c1b384714a3c8
SHA5122dae8f7ada2c438bdde6ba18069d9c92debcf4877cdc22c3610d062dceea859342e92f7d27901fc2f8a7ee80443dc6add8ec626b11e1ebcf3007f8d8ba9638d5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD521235be3cb53357ecf52c6de018ef4c5
SHA155d0b50206e968cc1e51fc4d0fb63e64deb78e46
SHA25610b108a4d2942b6fa852fee3c228a8a5a44ac4ee5bf8ccdb33775f188fcf25cd
SHA512c89c735374d99501e7c540845d1ddc57115db7f0f5554594720b533977aceeb8e7643cf3fbd53fbcda4dbff8f357462cdb206e85b2042cd530bf3bd599025a4d
-
Filesize
10KB
MD5d800a92d23a63a0d584ee345df40f89e
SHA17af2e5c8b87c9688402921924847dd4a247097c5
SHA25671594cd15b1e4f74292d39dc640d48b746b7dea554e657404b0c255b0aabec7d
SHA512cdaf6fcf4733673be5558359106441e6ab9ee100466e49f9a7b9518886627f49120dce85433a06fb8fd6549763f3a0266a1b50b46e8da91c6c494dcefd9e9652
-
Filesize
8KB
MD5ed39f0e7ac1ac59e2c90c590826dec71
SHA1d4480df2469ffe9cf297489d269fbde3db92391e
SHA2569ceef562ff108d5027dc0d10a237e135c95d75acad794779c98b8d340dddfffc
SHA5126466b89f1fce6ff3b4d07bdb535defd522cf53fe1671945c6ab1803dd97b89afbc11782bbc4826e174326d7e75ccf4713859b0d769a53ad083146d3c8a0c189e