Overview
overview
7Static
static
7Engines/HF...id.exe
windows7-x64
1Engines/HF...id.exe
windows10-2004-x64
1Engines/HG...en.exe
windows7-x64
1Engines/HG...en.exe
windows10-2004-x64
1Engines/Ti...10.exe
windows7-x64
1Engines/Ti...10.exe
windows10-2004-x64
1Engines/Yi...12.exe
windows7-x64
7Engines/Yi...12.exe
windows10-2004-x64
7Engines/he...12.exe
windows7-x64
1Engines/he...12.exe
windows10-2004-x64
1Engines/lzzjz.exe
windows7-x64
7Engines/lzzjz.exe
windows10-2004-x64
7Engines/pi...la.exe
windows7-x64
7Engines/pi...la.exe
windows10-2004-x64
7Engines/re...er.exe
windows7-x64
7Engines/re...er.exe
windows10-2004-x64
7Engines/yi...3A.exe
windows7-x64
5Engines/yi...3A.exe
windows10-2004-x64
5Engines/yi...3B.exe
windows7-x64
5Engines/yi...3B.exe
windows10-2004-x64
5嘻嘻五�...��.exe
windows7-x64
6嘻嘻五�...��.exe
windows10-2004-x64
5更多软�...��.url
windows7-x64
1更多软�...��.url
windows10-2004-x64
1飘荡软件.url
windows7-x64
1飘荡软件.url
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 18:31
Behavioral task
behavioral1
Sample
Engines/HForbid/pbrain-HForbid.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Engines/HForbid/pbrain-HForbid.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Engines/HGarden/pbrain-HGarden.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Engines/HGarden/pbrain-HGarden.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Engines/Tito2010/pbrain-Tito2010.exe
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
Engines/Tito2010/pbrain-Tito2010.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Engines/Yixin2012/pbrain-Yixin2012.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Engines/Yixin2012/pbrain-Yixin2012.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Engines/hewer12/pbrain-hewer12.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Engines/hewer12/pbrain-hewer12.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Engines/lzzjz.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Engines/lzzjz.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
Engines/piskvork/pbrain-pela.exe
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Engines/piskvork/pbrain-pela.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
Engines/renjusolver/pbrain-RenjuSolver.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Engines/renjusolver/pbrain-RenjuSolver.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Engines/yixin2013(A)/pbrain-Yixin13A.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Engines/yixin2013(A)/pbrain-Yixin13A.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
Engines/yixin2013(B)/pbrain-Yixin13B.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Engines/yixin2013(B)/pbrain-Yixin13B.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
嘻嘻五子棋辅助.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
嘻嘻五子棋辅助.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
更多软件下载.url
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
更多软件下载.url
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
飘荡软件.url
Resource
win7-20240215-en
Behavioral task
behavioral26
Sample
飘荡软件.url
Resource
win10v2004-20240226-en
General
-
Target
嘻嘻五子棋辅助.exe
-
Size
44KB
-
MD5
48c0440089848bfc667c3f83573c9524
-
SHA1
d8490bf3911c0023e07a473db3bcf7a79716e291
-
SHA256
1e3c61027862eec3bdfbfd25458c8c40cd9803203813d6c42c55c86170804a3a
-
SHA512
5fad30bf0e4e2b74e68bda5ce979ac361c6ec23075eb8f79c88b9e9ddfd1c2d7bb33e9842f26eab8e6e392b65880f876e48f1d1773f03d97c9cb6220590ad06d
-
SSDEEP
768:tN5b9z9b/irfBYvdrxc7dzpFKRwoucfKUQIDJKbpLAj2VXPomP:X5xzd/YfBWxc7b+Rub7sJKNLAyVXbP
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
pbrain-yixin13a.exepid process 1636 pbrain-yixin13a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 5104 msedge.exe 5104 msedge.exe 3872 msedge.exe 3872 msedge.exe 2736 identity_helper.exe 2736 identity_helper.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe 1152 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe 3872 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
嘻嘻五子棋辅助.exemsedge.exedescription pid process target process PID 1440 wrote to memory of 3872 1440 嘻嘻五子棋辅助.exe msedge.exe PID 1440 wrote to memory of 3872 1440 嘻嘻五子棋辅助.exe msedge.exe PID 1440 wrote to memory of 1636 1440 嘻嘻五子棋辅助.exe pbrain-yixin13a.exe PID 1440 wrote to memory of 1636 1440 嘻嘻五子棋辅助.exe pbrain-yixin13a.exe PID 1440 wrote to memory of 1636 1440 嘻嘻五子棋辅助.exe pbrain-yixin13a.exe PID 3872 wrote to memory of 1972 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 1972 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2980 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 5104 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 5104 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe PID 3872 wrote to memory of 2588 3872 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\嘻嘻五子棋辅助.exe"C:\Users\Admin\AppData\Local\Temp\嘻嘻五子棋辅助.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://hi.baidu.com/seemk2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x44,0x108,0x7ffdb76c46f8,0x7ffdb76c4708,0x7ffdb76c47183⤵PID:1972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:23⤵PID:2980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:83⤵PID:2588
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:13⤵PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:13⤵PID:4592
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:83⤵PID:4572
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:13⤵PID:632
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:13⤵PID:3296
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:13⤵PID:2260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:13⤵PID:2536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:13⤵PID:1332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:13⤵PID:4536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:13⤵PID:972
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:13⤵PID:4852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3108 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1152 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,3793745158053136576,16297651496382485985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1336 /prefetch:13⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Engines\yixin2013(A)\pbrain-yixin13a.exeEngines\yixin2013(A)\pbrain-yixin13a.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
6KB
MD5e2c764d25c32b15c27c01d84f089ac6d
SHA1b2f1a4378a001fc947ddce744d18e7805b4f2108
SHA256f963f02e3a4a2980a79086900f9e76300679f71b638dc4343ea457c0ddd73658
SHA512f74c1b5069e7dfb7cb02d615c414c7ef9c4200f1d9e2daf81d10ceb38503abd8afe5977ec2d92bb422a10c4bd9d0403d928d0d38f2c784fa112cfcf3ffa9b2e7
-
Filesize
5KB
MD50dfb11173f842bd4e0aebe4a68c9c15b
SHA19f965ca631e99189146748a157f7bdf5617dcfc3
SHA2565a732b8e275ef502da759e440f22ccbe61c14944c4811f1291f63ed4c9f0f311
SHA512b5a851005c838f22d43f5cda9d0a59d3a8408a0d10bb040653ca82638026d7ed3d53fe170f11e58dd1ceb81c06e7f56b31820d38b1779346ee6ebab5de008315
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
8KB
MD5104f30e92b41dafb15f75b7dc6347c77
SHA1fdaf522cd5791a44e9ef3a20f51344e70761b682
SHA2568b158be89837addaded4b26220263662e6d49cf6d73f1249f03c6e31d7451873
SHA512cecb719abe203f0dd1b5ff5b74d40ae4726a4fb0057c97a81a0f1dc4c47b6d079846bdbfe01175d277e9b25dcd3c220f48b9b521881bcc818628c66a5b9c544e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e