Overview
overview
7Static
static
101-HTML-fi...5.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...2.html
windows10-2004-x64
101-HTML-fi...1.html
windows10-2004-x64
101-HTML-fi...9.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
101-HTML-fi...3.html
windows10-2004-x64
101-HTML-fi...9.html
windows10-2004-x64
101-HTML-fi...0.html
windows10-2004-x64
101-HTML-fi...4.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
101-HTML-fi...6.html
windows10-2004-x64
102-downloa...ok.hta
windows10-2004-x64
703-malware...t3.exe
windows10-2004-x64
303-malware...t3.exe
windows10-2004-x64
3Autoit3.exe
windows10-2004-x64
303-malware...hF.lnk
windows10-2004-x64
32024-05-14...ty.ps1
windows10-2004-x64
3Resubmissions
01-06-2024 21:09
240601-zzxvbafa7v 7Analysis
-
max time kernel
138s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
01-HTML-files-13-examples/May_119275.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
01-HTML-files-13-examples/May_234892.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
01-HTML-files-13-examples/May_299872.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
01-HTML-files-13-examples/May_328152.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
01-HTML-files-13-examples/May_436171.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
01-HTML-files-13-examples/May_446619.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
01-HTML-files-13-examples/May_447386.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
01-HTML-files-13-examples/May_554063.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
01-HTML-files-13-examples/May_583479.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
01-HTML-files-13-examples/May_654380.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
01-HTML-files-13-examples/May_673434.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
01-HTML-files-13-examples/May_765966.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
01-HTML-files-13-examples/May_787116.html
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
02-downloaded-HTA-file/ok.hta
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
03-malware-and-artifacts-from-an-infected-host/C__ProgramData_febabbh/Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
03-malware-and-artifacts-from-an-infected-host/C__nkll/Autoit3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Autoit3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
03-malware-and-artifacts-from-an-infected-host/StartMenu_Startup_Folder_Shortcut_CecBBhF.lnk
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
2024-05-14-IOCs-for-DarkGate-activity.ps1
Resource
win10v2004-20240426-en
General
-
Target
01-HTML-files-13-examples/May_119275.html
-
Size
61KB
-
MD5
2b9647e5c3057dfa684326fa9c484a16
-
SHA1
ec38a04f0040c80fe4a29adc0adb4ac78dc3e844
-
SHA256
b8229d8cc26b1622815a3d3537ab3c6a4a1ec24888953eda0d69cd602f05c272
-
SHA512
c1d5a1122e189db3e36ffd3f56584098e4f41e42542a64cd0bcede40b9dc996f38ec2c5b1a877e89cd83b2c6affc961e96cf7c3c82f185b29dbf5d67064440f2
-
SSDEEP
1536:UzxuJKxK7kdK2FlBNt0kLENLOZ3m/AaH5dyM:Uzxu6xdK2F//B04m/AaH3yM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620184759058358" msedge.exe -
Modifies registry class 2 IoCs
Processes:
msedge.exeOpenWith.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{C3E61E03-7A7C-4B96-A1BF-49667B9D1123} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
msedge.exepid process 5384 msedge.exe 5384 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OpenWith.exepid process 5180 OpenWith.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
Processes:
OpenWith.exepid process 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe 5180 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5384 wrote to memory of 5420 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5420 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5696 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5704 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5704 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe PID 5384 wrote to memory of 5712 5384 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\01-HTML-files-13-examples\May_119275.html1⤵PID:692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3900,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:11⤵PID:3652
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4108,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=5140 /prefetch:11⤵PID:4920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=5144,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:11⤵PID:3820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=5428,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=5472 /prefetch:81⤵PID:5076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5436,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:81⤵PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5952,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=5564 /prefetch:11⤵PID:468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5868,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:11⤵PID:3272
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=6396,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:11⤵PID:2912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5444,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=6024 /prefetch:81⤵PID:932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6788,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=6796 /prefetch:81⤵PID:4104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6804,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:81⤵PID:2300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=6960,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=6784 /prefetch:81⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=7092,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=7100 /prefetch:81⤵PID:460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=7220,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=7216 /prefetch:81⤵PID:1332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --field-trial-handle=6400,i,13640054265074968359,8146127767143474550,262144 --variations-seed-version --mojo-platform-channel-handle=7396 /prefetch:11⤵PID:5144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=124.0.6367.118 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=124.0.2478.80 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ffa27edceb8,0x7ffa27edcec4,0x7ffa27edced02⤵PID:5420
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3136,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=3132 /prefetch:22⤵PID:5696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1944,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=3192 /prefetch:32⤵PID:5704
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2172,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=3300 /prefetch:82⤵PID:5712
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4456,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:82⤵PID:3644
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4456,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=4436 /prefetch:82⤵PID:5184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4732,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=4524 /prefetch:82⤵PID:1464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:4172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,94083777720356002,11035740633908335296,262144 --variations-seed-version --mojo-platform-channel-handle=4516 /prefetch:82⤵PID:3820
-
C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\124.0.2478.80\elevation_service.exe"1⤵PID:5860
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5180 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\01-HTML-files-13-examples\May_119275.html2⤵PID:436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
5KB
MD5c8c4326ebe5cfb17892cd001085d6077
SHA141cdc5f187df8c447eed64845af518168c7e80d1
SHA2565de3f5dc258d79454d180aa6cd52cb72dd0700187cbdcb1472bcca21296002d6
SHA512c9f3f405ca644f8778590fa1f765e61ed74550e0eee34bf54fdb64fb8c458111817bf034a3c9a631ba150fb338758820faf067cca09007412227ded09cb0a79a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
11KB
MD524d89a8cb4e4df40b378b15e5a4c8a07
SHA1c71ee2248683c86d3d234f984673ff2822a8c4ea
SHA256843b03c2eaa767dd66a09002e3030a3c4607a5380a466a9de74b4988f121f6d5
SHA512dc6e3ae0aec9d2e8517b954a6fcdaa0c26407f2855309ae5b93e39392909f1f7bf289aa680c1b12b8e4d234ba16092475883970bd7ebc0047c1ee72ab998d00f
-
Filesize
30KB
MD526717c994b795f98c2f860153c09caec
SHA10febb5c65ee502c10ec4358b12144c0dea6cd61c
SHA2563ffefa6f39c1f754039c1a13a003b6f283c6c1580c047a2ff7ba4ef17029bee4
SHA5122ef7498d62df5baf0aa6165cb0e1f919aa91cef6f349cfc6a432285378314da84bd001791a0020a19425056c044ce80cf501ec648bc6eca33274296686483841
-
Filesize
71KB
MD5d5ffba24598e35146ff1d8c5ecd747f9
SHA1f0fb15578086925f05f0fb944bf584136fc1dca7
SHA256fbe2751e70349ef74ac545196dacfa1e6bb3d58b790cbb864a0d943fa228e077
SHA512e51d6a79f8cb46a9bc84c4d2508948c7d49056caaf58a1f6c68301023cfc2efba8ff92fba37e0b767481205445c99a4b3302c7dbb242252cf9faa4d87b55f944
-
Filesize
71KB
MD5b36f2822177019d643da156b8890b7f8
SHA158535e578db4d2948958e234e7c2f0c1e0dfe3b8
SHA25689ce2490b880b7d374a37180ab6500354a173f09a09a80db0eef8a1a157ab171
SHA5126499997ad9f807ef5401585e49da300d9ba3976dd71e32f25782d2ca9e84b5d35ab8077b816ca320c0854b6d328c5ab90d27b9555c41bb70e1ae2d82d82409a7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e