Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 04:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://apkmonk.com
Resource
win10v2004-20240611-en
General
-
Target
http://apkmonk.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 22d76eff68bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{33B51AAE-35CC-11EF-B1BC-5A352D2CFE47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 808 msedge.exe 808 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 5508 msedge.exe 5508 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe 3152 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4992 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 5412 iexplore.exe 5412 iexplore.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 2268 OpenWith.exe 4416 OpenWith.exe 3432 OpenWith.exe 6052 OpenWith.exe 5224 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 4992 OpenWith.exe 5412 iexplore.exe 5412 iexplore.exe 1384 IEXPLORE.EXE 1384 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 436 808 msedge.exe 82 PID 808 wrote to memory of 436 808 msedge.exe 82 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 244 808 msedge.exe 83 PID 808 wrote to memory of 3148 808 msedge.exe 84 PID 808 wrote to memory of 3148 808 msedge.exe 84 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85 PID 808 wrote to memory of 4608 808 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://apkmonk.com1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf84646f8,0x7ffdf8464708,0x7ffdf84647182⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6064 /prefetch:12⤵PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:12⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6428 /prefetch:82⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵PID:5688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6176 /prefetch:12⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7020 /prefetch:12⤵PID:5728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7184 /prefetch:12⤵PID:5736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,17222782462140454041,11346056757577512127,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5200 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1112
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2268
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4416
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3432
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5224
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\com.gemstone.legends_2023-08-11.apk2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5412 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5412 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dabfafd78687947a9de64dd5b776d25f
SHA116084c74980dbad713f9d332091985808b436dea
SHA256c7658f407cbe799282ef202e78319e489ed4e48e23f6d056b505bc0d73e34201
SHA512dae1de5245cd9b72117c430250aa2029eb8df1b85dc414ac50152d8eba4d100bcf0320ac18446f865dc96949f8b06a5b9e7a0c84f9c1b0eada318e80f99f9d2b
-
Filesize
152B
MD5c39b3aa574c0c938c80eb263bb450311
SHA1f4d11275b63f4f906be7a55ec6ca050c62c18c88
SHA25666f8d413a30451055d4b6fa40e007197a4bb93a66a28ca4112967ec417ffab6c
SHA512eeca2e21cd4d66835beb9812e26344c8695584253af397b06f378536ca797c3906a670ed239631729c96ebb93acfb16327cf58d517e83fb8923881c5fdb6d232
-
Filesize
88KB
MD5c59b98e57c763450400dbd3d4e617755
SHA1456eac5d5b5057187c734aa93d0ced4be4f93d89
SHA2563c61b0407887ed69217e9c05c49f1b73f3d94128526c7abe61ba477c8871f6c0
SHA51283e8958114bccdef4c25675b2ec22d47c2724d79a95120e5b6efc15557aac6beef2973fd5f290a589f5c26f3f5e4abfa7da2dcd5513813e047f65cd3556088c8
-
Filesize
51KB
MD58a2a5ab1595a3e676c2755f3e4608212
SHA13f5df77f88601d88639cd6fb07609fe41164fcdb
SHA256e90cc4d5807a4b7918aec77ab7beff6ccd28febc879c2abaaf5e081cf8c044ab
SHA512ccd8067656021bf0487b46d620b03bbd8e9fe74a86785153b0178bc5871841a5570e3409631c5cf7cebf52d86e226266a7492c963f7f1a686c6b55fbe914be1b
-
Filesize
63KB
MD5a91c8acf084daefe905c538075d9e3ff
SHA1398a0d67e3e87fb1f01a644a5b9820ab5d5d69b6
SHA2569901aba2e46fcf181f9b641590df7bba839243151e8747c1e6798703798bf4af
SHA5122c0aaa2bd478af9cd3424bb483260dfe174f1c02ee1638565c6dfe43f7181e12e0788dfcd19316c6a884dbb02144ffb35fb886caedcf29f8a2c65ba70079fc0e
-
Filesize
27KB
MD54efb9aa5385421fc5899f9e7abf7e8cb
SHA12572cbd83a21ce01f315c126505f20f5e52da704
SHA2561f9c006e426f89d13e2ad5550f1eb29e85fa4595b31086be29cd9adb3cbdc960
SHA512e4ac6b0b72ffaab0dac276a764e6bfd7c78cb07024adfedaf0542a88515ca57bbcaa6c679dcf0f221f2da4840f25aedc08cb0a68146e181cf776b959b5463d07
-
Filesize
19KB
MD5c52f3521639f61d058b371c90f7340a0
SHA126cda00aa74d363215fe8e5de80878cf767d9747
SHA25698dadb40ba05b9079b6c7cfdcdce83a11764b15cee748e1d6b06ef13e94f1736
SHA512ead5c9d264cb85f32a1e4e7ca84df51b2d8fcad89abe35b8a9e461cab914224e5ee9c3b0cbcaf720ffaf43566b9d9c958667024e0e6988f948640fd782ff3f23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD56394a49b8e67b6c5225a6efc24270060
SHA1a523576b733c8e8283114ffc8d6c494a46903981
SHA2566c433f853f86317f532e07ef85b08d09e2d6d5ed6cbb573302a7ee769e00118f
SHA5129eb45e38db05c743a648537f4e6a3854df17e336637b4be2ecacf70fdab25b128760f21fd46950a0e6666c5da7bbe85ed1290e876b9aa8faedb79a2adb2ce0cd
-
Filesize
3KB
MD5b54a75a02d8d8256c927f4970724b307
SHA1c9be78ddb0d9c1bb1fe64a0883bf561ee599c883
SHA256543ae8032bdb52efaf3c5b5f66aa1a91061ec173340ef2b790b93f32c48713a8
SHA512a10cbb1e7112af5e43f433f8c988d8bf6f393f0fb44545c0b3f7735bff4ef8d06857071be910924b199d8128111ed720771d8b5dbc408e59d26ef3437fbeb1d8
-
Filesize
8KB
MD588a82fbda459f0a964373fb3b946d42d
SHA103c241014ca83d5f8fc75b147512d94020ca7d8f
SHA25664e08598d02599b6241a65a8b9d6ecd367ac649f3c072676f38ab57cc5ea579b
SHA51298726772f5f853d775043016cc99c0895ab3c6fb2266f31896684eabae1dbbf625ae78f9053e7b444d3a2faf577e266ed449dba51f1c9748b9179df1d19f968b
-
Filesize
5KB
MD55f33001c7ad7ad28f168c4ca465e627b
SHA1073e127432196068253fc1a54c11977e7ec98e42
SHA256a5ae414b6e5d7f4ba029a1fdb00b576be18ae795d6ddbdb3fcfa38afec4ac484
SHA51215f6dad9a4070021aedfb8f34ae3fa054abb438441e31bd2dfcec245da92bbd572cbcee35798ca38e414a7817dfc915aeb2a5635de7fcb0ecf2617084113a620
-
Filesize
7KB
MD50a1fcb0af6f18e05c59654f11d2c69e9
SHA17c01beb7fdc61a587894e517405192de8e4a1eea
SHA256342433392cb9497e5e2ce288f3464256f970ede7fceecf0ece75057548961dc4
SHA512e74516097dffab9944a2b588a5967321afade060bb26a79ebe203cc2893f867ee8aed280a9282e801f6cbc2c04911773102053dda79625eec83d144febfd96c5
-
Filesize
8KB
MD53ee6f3502969b641d359f46e0afdbd60
SHA148e24d889c755415d5f6d833834339a6272c07f1
SHA2562b33e3afcfc95f0c0b343a20388964324b56bcd96253298865cc55e4619e931d
SHA512cc1995b4950cb1697811ef83cf5ecdbb2b1d291b930db4ae3d0dd4974a190e449677d41a50ea235b01ec8721fcc122bc805c948585d8d792dab48424a35e5c65
-
Filesize
1KB
MD54f99439661958ab5c73507dd93d25119
SHA1088ce8e49eadcb47837e0434d537864ee5791ec9
SHA2560164e58f04769df83af618ba023836867475f87cc1b2f4fbd64a729aacd4634d
SHA512afac4af8dbea4c5735b841295e8d1f05e5c535d81844f5ff10616f30f4b9c242d732f046a504d94acffebe859b96a870e6deb329b1c0d9b7e639af6e859241da
-
Filesize
706B
MD597e9b786aa8d7cd9b5e68d1c9cfa1512
SHA10d07de5898fe5eb4ebcbdaa125d72c937c5baee5
SHA25608cc1258c9c00c82b2026ae366be2e72ea2adfd228d2df326b26a6be8f5bc569
SHA5121711897bee9a5923459165d91ec435a04397c2694a018b30b7b57b3ceb9e9500d850d3d1544e487ebe89001668d7076e17536fa106eed80ffe8d85ab59aae40e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a477f810684387bdadd4dcfc30a6364b
SHA1b78a6e02231e9b642f45e9b25dee095ce162f76e
SHA256b059cd6163df1363d312ee29d5ac056f57f4d89bec2cf3c3c0479b7ca56cd6ab
SHA51285e76164c8f6980f0b44f3257302d21fc7f8329c99a95d6ea32f88ae45c49bce98af1a1b6b6fbade449aad8f5e94540a42d7ce67b313500b3a691312e596f3a3
-
Filesize
11KB
MD52fa85e5db22670ff5966c5b127310709
SHA1082a18fba2176d259258308de54f87bc2cd81fab
SHA25691451a76710826879e0257a2f66c49702394c585c5f662e61838971c14d840f2
SHA512ccf4878798c28e97d26127992b815653d5a72cd76b48c152665d5ab679ef7e4a3b6f6e6c699ec76c7d57bddb79c2b5433dd3aed153ad10f765ec0e226c0042fd
-
Filesize
12KB
MD509ce9b09b7de390dec19b97aca4680e3
SHA185bbf15b8b28694c692df10300d0783ac16c1d8f
SHA256ee8dd0c243565534c0e576d02c76ed07df44669feb09b3c62d0b2b31c8f88cea
SHA51231a0818161eaef224fc116e7930566d4ad56cfc97d46cb9e54858a15af52979317d1ae5ccb7029707a27e67f972d32252ee224bbfa54100eec727d96ec93f1bf
-
Filesize
45.9MB
MD5a7df4ef3b1b41f219c91df927ad17800
SHA15f34f41a657f250ec8fc86758110c4338ad1524c
SHA256347f698d5c8ac5a751f28d0ea0f84dbc18a63858d3c24974278cd680cea7296e
SHA512c3d2583cc4405a0a99e6c3c74b3db9d11229ea20827cb6b14afb409a13698cb83ca041076b833ccda575a594232dfd80cdb391a73fb59ab892c9ad7cd9918b38