Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 21:39
Static task
static1
Behavioral task
behavioral1
Sample
taskhostw.exe
Resource
win10v2004-20240426-en
General
-
Target
taskhostw.exe
-
Size
110KB
-
MD5
aaa6ba42398b2d70f12f00a110701041
-
SHA1
ced61e8f26b48188e1aae8fc629ed45a666348d0
-
SHA256
58cc5757bb129557652797ea92aee701de5c574b22fdcd5dcddf141caeea3c02
-
SHA512
9bf01f585125add531b3ea912bdec980aed0eb53a20dfeb06be4cc5391c8fd75e8622e7246a499ed1cd5434ba7f50f058aa23938c2752d27cdd6e63bf788086a
-
SSDEEP
3072:DsyzW5Y8Vvg6vz/J+x+fHz51TYKsQEh23:JzEY0xzx++fV1TYKF3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 9 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 3 IoCs
pid Process 1184 WINWORD.EXE 1184 WINWORD.EXE 4604 vlc.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 320 chrome.exe 320 chrome.exe 3000 msedge.exe 3000 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 3968 identity_helper.exe 3968 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4604 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe Token: SeShutdownPrivilege 320 chrome.exe Token: SeCreatePagefilePrivilege 320 chrome.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 4604 vlc.exe 4604 vlc.exe 4604 vlc.exe 4604 vlc.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SendNotifyMessage 51 IoCs
pid Process 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 320 chrome.exe 4604 vlc.exe 4604 vlc.exe 4604 vlc.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe 5044 msedge.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1184 WINWORD.EXE 1184 WINWORD.EXE 1184 WINWORD.EXE 1184 WINWORD.EXE 1184 WINWORD.EXE 1184 WINWORD.EXE 1184 WINWORD.EXE 4604 vlc.exe 4564 AcroRd32.exe 4564 AcroRd32.exe 4564 AcroRd32.exe 4564 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 3092 320 chrome.exe 87 PID 320 wrote to memory of 3092 320 chrome.exe 87 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 2728 320 chrome.exe 88 PID 320 wrote to memory of 4736 320 chrome.exe 89 PID 320 wrote to memory of 4736 320 chrome.exe 89 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 PID 320 wrote to memory of 3544 320 chrome.exe 90 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhostw.exe"C:\Users\Admin\AppData\Local\Temp\taskhostw.exe"1⤵PID:840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffffc19ab58,0x7ffffc19ab68,0x7ffffc19ab782⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:22⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:82⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:82⤵PID:3544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3088 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3132 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4364 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4512 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:82⤵PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4664 --field-trial-handle=1892,i,11211414413242716689,3094091857308582714,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4516
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\PublishUnprotect.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1184
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DenyConnect.au"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4604
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:4564
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffebbe46f8,0x7fffebbe4708,0x7fffebbe47182⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2876 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,14160147431341954856,7557118266895964914,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:1856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD58bee8be0abecc4cc78cbcf2e3d7424a7
SHA1d94ec8470c6a6a3078f84c1b9fc6208d1ddea1e6
SHA256a46a234840f9d7915e4c3414db2a889df8b6e955da45ef44da7a4930407fec58
SHA51261f13c54c7e8e2688d59a37af7396be26fd14b3f74bb042530ae5c974643918609ea7132c806204814c1f0f3f1811f88cde2a855aed73a187bba5aae09018462
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5c66cbf1e4d71b56188e251077de12ec7
SHA1f5a304011a6a896555e32cab4c776c77c37301bb
SHA256cf01c16d09f1ae86c6c16ba0049f7acbbe51a28f45dd078734c9442597f0df7b
SHA5120b4eccf7f0add2d818c829c2966340977d4e196af165e8338e5a00ab6b5213269f896c6715025e6e9b095d8364360cd63b0b85e271b6a1b0167ca705c901a8b5
-
Filesize
6KB
MD50d47c5bf55e5b7a85e377680dbbb4499
SHA1d8972193748fe9158f2dfaefa50d4154e535ebdd
SHA256489f354ef7c96606e0985860b20a2499fc936615eb035ec2b12d68c17806063c
SHA51270a741b4a2362cc65e0dc8c060dd67967aae6377cd7847d46af9de154eaeef05eafe49a2e3c9f46cc446f4df46895c23479171bb20470bf56cf0aeda290aed4a
-
Filesize
130KB
MD5a03d9fe0635c764489c42fcff646a9b6
SHA12b57ced1e4149000fdf60573da3c4ab919566356
SHA256e7afd2856a118d77681de5066737373be1328e276c509730bd2f1e55de71972f
SHA512fa955d9d70a3e02e6428585dce5da61632bc5ca47a23cdea0c15fffe32e1d327674258767cc5f257fede7b1a5d5dac922c333bbbb9cc204526382056ad6d6c53
-
Filesize
10KB
MD50c34ea08e6bc3811ffc43d431fbc0144
SHA1c403db8dc08b18e442ac8588df8f6eaffdd7b2bf
SHA2566a7f21b1378e3ca3832e129ed27b5aa25daf85a80a3be193a3d27d0f4cbaf93b
SHA512f15f4223fe9022e47239e772a6465ed22758a506f9466b22dd9bfc1f830b3e592c5c4b15f14b7baf1c65ab36d814c0df6869eaee70b07064ad6c30cfc47c9928
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
5KB
MD57e12f27dae5c7daf45f2353b5d5fcbcb
SHA1eebacbf1b9a146000f2d762ef1def3bf8d98e55c
SHA2561b6c80cb074579dc1170d252e7897d35473d97ca7ed8cac062d7230a51a9b07e
SHA512a1b9dec8dfc765f154f3478558844bfe7eecd9d7b2a0379f13386eca0db70551b1f019fca8b45eb5caa5a986a321aa65abd75cf7ad9fbe5a30cec44becf0cca5
-
Filesize
6KB
MD57bebe164f6e03ebd3fab11ac16082761
SHA14c0adc2573990ffc972438981e00876d55ad0202
SHA256b3b926fe67578652ca4670d41b875216a32e7feea6e6cf02d77b97cacf94ab29
SHA51228175fc3fc758b939580da240fe0d070fb941c65f4d9ffc3190a7a35420e649cb071b047cf7adbb52b196ed4f92b36482f264c0247a0e0864c09e60f6e78b651
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5838007928ac115a809dfc2fe21f82694
SHA192f9a3e4dbce2363f00eadfe479daaddfcf18841
SHA256d4d5308b7d22c1d11248ac4242a6691a084ec04620c719af78b8d5d707cbdada
SHA5125471e8fcb865ee280f76b00546071ad370755670848e6dbe89716cd829ef0103fa786d24f155e6951dfe5ff7786531296182156dc1197109f9bd0bf04f3014c9
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5c6a0076a0b2ffad54ea9e1ee9affb31e
SHA1e882b7fd0253f218b7aef9c3ae4030dc6e16c317
SHA25677e166e96bf3a35e7e50c6321dbdb0004daebe1c260b69caa6e07fd4a5525541
SHA512b7975a9904256c0c7d38bacb57fd1080afd95f32671f9f0e50b8f8e88231022c9e4c8462dbf50df02816e070dc0fc2fb370217c28612d5d84034bad5a4e5174e