Overview
overview
10Static
static
10WavePreTes...re.dll
windows7-x64
1WavePreTes...re.dll
windows10-2004-x64
1WavePreTes...ms.dll
windows7-x64
1WavePreTes...ms.dll
windows10-2004-x64
1WavePreTes...pf.dll
windows7-x64
1WavePreTes...pf.dll
windows10-2004-x64
1WavePreTes...d.html
windows7-x64
1WavePreTes...d.html
windows10-2004-x64
6WavePreTes...dex.js
windows7-x64
3WavePreTes...dex.js
windows10-2004-x64
3WavePreTes...n/mime
ubuntu-18.04-amd64
3WavePreTes...n/mime
debian-9-armhf
4WavePreTes...n/mime
debian-9-mips
3WavePreTes...n/mime
debian-9-mipsel
3WavePreTes...me.cmd
windows7-x64
1WavePreTes...me.cmd
windows10-2004-x64
1WavePreTes...me.ps1
ubuntu-18.04-amd64
1WavePreTes...me.ps1
debian-9-armhf
1WavePreTes...me.ps1
debian-9-mips
1WavePreTes...me.ps1
debian-9-mipsel
1WavePreTes...DME.js
windows7-x64
3WavePreTes...DME.js
windows10-2004-x64
3WavePreTes...dex.js
windows7-x64
3WavePreTes...dex.js
windows10-2004-x64
3WavePreTes...DME.js
windows7-x64
3WavePreTes...DME.js
windows10-2004-x64
3WavePreTes...ten.js
windows7-x64
3WavePreTes...ten.js
windows10-2004-x64
3WavePreTes...DME.js
windows7-x64
3WavePreTes...DME.js
windows10-2004-x64
3WavePreTes...dex.js
windows7-x64
3WavePreTes...dex.js
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 17:32
Behavioral task
behavioral1
Sample
WavePreTest/WavePreTest/Wave.Dir/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
WavePreTest/WavePreTest/Wave.Dir/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
WavePreTest/WavePreTest/Wave.Dir/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
WavePreTest/WavePreTest/Wave.Dir/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
WavePreTest/WavePreTest/Wave.Dir/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
WavePreTest/WavePreTest/Wave.Dir/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fgd.html
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fgd.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/index.js
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/index.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral12
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral13
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral14
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral15
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime.cmd
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime.cmd
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime.ps1
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime.ps1
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral19
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime.ps1
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/.bin/mime.ps1
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral21
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/accepts/README.js
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/accepts/README.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/array-flatten/README.js
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/array-flatten/README.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/body-parser/README.js
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/body-parser/README.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
WavePreTest/WavePreTest/Wave.Dir/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win10v2004-20240611-en
General
-
Target
WavePreTest/WavePreTest/Wave.Dir/Monaco/fgd.html
-
Size
18KB
-
MD5
a1416c1fe209f7687ff79ab44301b3d3
-
SHA1
3ba3ff0027a98128edad78f5561cef53c4236791
-
SHA256
a6897302dba619dd3c156d57fc4b706662bff4df582975c33478b7878b060d2c
-
SHA512
ce8a9aaf7ba903dfb25df53e04addfedae7ee4fcd07dffd42abf3f275a75b14cb26bb64c9320fd425003c73618b2967bb7be2cfb849050d50dd5308e69842f79
-
SSDEEP
384:fihTARA5Lmwl1qPeVvW4NVtabVBJjVBd+TI6noaQLR7:fihTjoy+StabVBJ/kkgoaQLR7
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 raw.githubusercontent.com 44 raw.githubusercontent.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 msedge.exe 2080 msedge.exe 4828 msedge.exe 4828 msedge.exe 3920 identity_helper.exe 3920 identity_helper.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe 4828 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 920 4828 msedge.exe 80 PID 4828 wrote to memory of 920 4828 msedge.exe 80 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2892 4828 msedge.exe 81 PID 4828 wrote to memory of 2080 4828 msedge.exe 82 PID 4828 wrote to memory of 2080 4828 msedge.exe 82 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83 PID 4828 wrote to memory of 4488 4828 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\WavePreTest\WavePreTest\Wave.Dir\Monaco\fgd.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc24e46f8,0x7ffdc24e4708,0x7ffdc24e47182⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,2734092961928733883,3460482866019047969,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1976 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
746B
MD5dced54fc354106c538a95a4cc9fea299
SHA114da15110c054d9172b202017c3991ae010c7f26
SHA2567ecd65cf4dd9e2a39163b7626fcb768ab8490190e134b86d60397488bbe46cac
SHA512b3f82b8424cde389f09a4b3b1f46fabc56167a70b2f5559fc6d034392d85b2b0cf7671cfc72ee66112ae639b5185e85a685c02015eee03c4e3662c5a8b231446
-
Filesize
5KB
MD5332228eb5e8225ed8b090e35170c4c8b
SHA1dcdb8baa6329cfb5d07024ef498e358a49d09903
SHA256e9af9189eb5a4e874f901a587b91bbd2c7719c3f305de42b95b64564f0af4407
SHA5125f48ee303bb5e22e87c3fc0fc1db3a314834f2b2872c33f3001d683de55de43ddf357a8ade14a26b8a1ec4c98a6ac360266f8429d8680256bfdf251802c2d8c2
-
Filesize
6KB
MD5fa5e78c8ccaf9321019abd8294955c32
SHA1e618a6ed709f650672e94090e7064416395543ff
SHA2561f62e51269e4d1ed08183df449c9dd90766ff539ba231809f927c65a607d4e1e
SHA512ccb46a9b1b814816534b2cf503a724e56e54c013d5bbf3df4ba0046cf733ee2b61085eae84a14acb36edc594c6b2632d38e912344d112365e065fdd10557337e
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5eb477acba77736484754bbd35fc0bdeb
SHA139662ee7ac65fdd0cebaf5960d337b305e4e1f84
SHA256948e1744c5b7c9c73c95675fdd9a671191963557103d8451a70210fda24b5eda
SHA512c8c0f6ec85c1b983291e5d3df93dc08b2e9a8732c0a9d65d4c276a0917d69786a39a29cc7cbe467f1958765a41c28a58960050d6296427929b7d9617de2ca948