Analysis
-
max time kernel
52s -
max time network
55s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 10:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mandrillapp.com/track/click/31165340/auth0.openai.com?p=eyJzIjoiZTV5akVVTVFfd3lWSEtEQi02ODRnZjJCM0hJIiwidiI6MSwicCI6IntcInVcIjozMTE2NTM0MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2F1dGgwLm9wZW5haS5jb21cXFwvdVxcXC9lbWFpbC12ZXJpZmljYXRpb24_dGlja2V0PUZOd2EwaWJZeUdDNlVWVVJqN2Rpc1JmRHhHalMyczhEI1wiLFwiaWRcIjpcIjcxY2IwZWMwN2FlZjQ2M2M4NDBmYzc4NzQ5OWU1NDAxXCIsXCJ1cmxfaWRzXCI6W1wiMWM3OTUyMjNiMmQ0YmUwMjBmZDJhNTBmMmM5YzQxZjEwMThlNDU0Y1wiXX0ifQ
Resource
win10v2004-20240426-en
General
-
Target
https://mandrillapp.com/track/click/31165340/auth0.openai.com?p=eyJzIjoiZTV5akVVTVFfd3lWSEtEQi02ODRnZjJCM0hJIiwidiI6MSwicCI6IntcInVcIjozMTE2NTM0MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2F1dGgwLm9wZW5haS5jb21cXFwvdVxcXC9lbWFpbC12ZXJpZmljYXRpb24_dGlja2V0PUZOd2EwaWJZeUdDNlVWVVJqN2Rpc1JmRHhHalMyczhEI1wiLFwiaWRcIjpcIjcxY2IwZWMwN2FlZjQ2M2M4NDBmYzc4NzQ5OWU1NDAxXCIsXCJ1cmxfaWRzXCI6W1wiMWM3OTUyMjNiMmQ0YmUwMjBmZDJhNTBmMmM5YzQxZjEwMThlNDU0Y1wiXX0ifQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-540404634-651139247-2967210625-1000\{91D63BB9-23DD-407F-ABD8-1FA4B5F253B6} msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3444 msedge.exe 3444 msedge.exe 3328 msedge.exe 3328 msedge.exe 4392 identity_helper.exe 4392 identity_helper.exe 1080 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe 3328 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3328 wrote to memory of 1808 3328 msedge.exe 82 PID 3328 wrote to memory of 1808 3328 msedge.exe 82 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 4224 3328 msedge.exe 83 PID 3328 wrote to memory of 3444 3328 msedge.exe 84 PID 3328 wrote to memory of 3444 3328 msedge.exe 84 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85 PID 3328 wrote to memory of 4272 3328 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mandrillapp.com/track/click/31165340/auth0.openai.com?p=eyJzIjoiZTV5akVVTVFfd3lWSEtEQi02ODRnZjJCM0hJIiwidiI6MSwicCI6IntcInVcIjozMTE2NTM0MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL2F1dGgwLm9wZW5haS5jb21cXFwvdVxcXC9lbWFpbC12ZXJpZmljYXRpb24_dGlja2V0PUZOd2EwaWJZeUdDNlVWVVJqN2Rpc1JmRHhHalMyczhEI1wiLFwiaWRcIjpcIjcxY2IwZWMwN2FlZjQ2M2M4NDBmYzc4NzQ5OWU1NDAxXCIsXCJ1cmxfaWRzXCI6W1wiMWM3OTUyMjNiMmQ0YmUwMjBmZDJhNTBmMmM5YzQxZjEwMThlNDU0Y1wiXX0ifQ1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8797646f8,0x7ff879764708,0x7ff8797647182⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5088 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5768 /prefetch:82⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5760 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,14853501032596609991,9077227923311982757,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:5324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52daa93382bba07cbc40af372d30ec576
SHA1c5e709dc3e2e4df2ff841fbde3e30170e7428a94
SHA2561826d2a57b1938c148bf212a47d947ed1bfb26cfc55868931f843ee438117f30
SHA51265635cb59c81548a9ef8fdb0942331e7f3cd0c30ce1d4dba48aed72dbb27b06511a55d2aeaadfadbbb4b7cb4b2e2772bbabba9603b3f7d9c8b9e4a7fbf3d6b6b
-
Filesize
152B
MD5ecdc2754d7d2ae862272153aa9b9ca6e
SHA1c19bed1c6e1c998b9fa93298639ad7961339147d
SHA256a13d791473f836edcab0e93451ce7b7182efbbc54261b2b5644d319e047a00a7
SHA512cd4fb81317d540f8b15f1495a381bb6f0f129b8923a7c06e4b5cf777d2625c30304aee6cc68aa20479e08d84e5030b43fbe93e479602400334dfdd7297f702f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize528B
MD58e0f8d8738287570c70e6eaf612e3cba
SHA13ca9319d5be2af43369db0ccf512d21900a8b0a8
SHA2562f85d7efa17b1ce9ef578d846e02a81e893344d663aa584413a5d52498cb9f43
SHA512bbc21f615ee2dcced9229ad963ec9eed906ebcedb380bbc41684586cde57eb87cb675bc6f53476d02f2012ac12eea1b2a064445f83ad2585f7d3902abbc864d3
-
Filesize
7KB
MD5918d98a5977674a24972aac7e7bfcc78
SHA1a382ac332822e333a1e62101ada35b5571fa6446
SHA256ef42d38a0bb5046adfff60b602c078457d93d3e417815fd84042674371c70e92
SHA5126aa454e0e40742065c998c6cabc1e1e3f2fe682cfe015338def4b31368b7b39d06e548bcd8a3ad6875e793d9a46a0cb5d0436746add81cdbd23ca07a98690b3d
-
Filesize
6KB
MD5f858acc2067fb5a7e19a872902526a4d
SHA10bbad6518c0f25dce07732dd49c59b2f5ec62dcd
SHA256d1c5f162979e2ef8419b1e61cbf7ed539c5297276a429e73135c75d5196d90db
SHA5127d077c861cd844fcfe2802872bde8a510beedb8a38b3ec75e5d587906b24a080e0bc5337112ad0c003f8b029aed99af371fcc1a4a0072305957010f049ef58de
-
Filesize
1KB
MD5c9057e17a7d1e5fe0d3c8d78244e0211
SHA13a79c1589dbdd95e68751c799be2c2a5c48a119a
SHA256236053801d5887fd96d6d21370013a36c52855b260d6043c878d4be67e5c537a
SHA51299b03b78854a5d327b98020b49e6a61b0fe205f1e3fcd71c1011c7e5cdc14fa71b6ea68e495ab6282491f93650fc40faae99f2945a9c1aba3efb9002ea92bfed
-
Filesize
1KB
MD5b04cb6f4c8354f6662d68964ac9a98e8
SHA187af0d6c1a18199b53fe92829fd92c2afbfff32f
SHA256c3c918d295faf1e3d746452a3421821799cb0d29f66eed30844e9b3255460a32
SHA512d1b13522b8e8c54f440b178df2214b1f0fccf59a59afaead6686e3bccca4b053d7580497e3551f2a4edf19f519e9e5395ac121da7482ab8f85210bef7c5efb97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e40c4800-b579-43fe-9ab4-f935cd21e96b.tmp
Filesize5KB
MD5790a4f9d042c0819629df797e21d17af
SHA14e955f4d6fbbbf05c5d00140e0fc57e7f14c95e9
SHA2560285b1f111bfae351239036f0c5fc2cfd0ff1475b71b47480e89ed0a89e1a861
SHA5122e149b80a6fe66c34cdd6a4f4578d08279ed2a5b7e32b394b066b22977549af4ba40b2bc9900dd93621c16669363a0d3f2f7fcf732e1a262652ad0dccdb72aee
-
Filesize
10KB
MD51eab762d7722ea52dfbac774f87e53d0
SHA1545732c432d5470f0f567ada3d58ad2c57ce2bde
SHA256e46d36ab7196e41d05802132bbd125e27adce687c887d1f8005f2b92eeb19f29
SHA512945a1d3c0e8acb450598203d93b115dcb4d3eddfca2b7f2f29a72a9a789b30001a1171c5d218f87b25bfbd09a15d0bc1cdac18b5a34a592fdf85fd94d14c1fa9