Analysis
-
max time kernel
1707s -
max time network
1720s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
serial_checker.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
serial_checker.bat
Resource
win10v2004-20240508-en
General
-
Target
serial_checker.bat
-
Size
454B
-
MD5
fa70cdbb3fc5fc08aff5db9270dd662f
-
SHA1
87e21ed26ae37cfa14a56ff000f3c29dedfa23bc
-
SHA256
56e0af9513d41127dd33933116970b3d2560d0586f7a64b6ffdf215d1fc762ab
-
SHA512
8e44ad0ac87ce8335377dc2f40d5b3960e727ffd5387e0b1b411e03e9b772dfd21c523fec45327edd04b2ae4226ec4def4cc4783f3484b5f3e80e24c4ae2a826
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2652 msedge.exe 2652 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1540 identity_helper.exe 1540 identity_helper.exe 5904 msedge.exe 5904 msedge.exe 5904 msedge.exe 5904 msedge.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4572 WMIC.exe Token: SeSecurityPrivilege 4572 WMIC.exe Token: SeTakeOwnershipPrivilege 4572 WMIC.exe Token: SeLoadDriverPrivilege 4572 WMIC.exe Token: SeSystemProfilePrivilege 4572 WMIC.exe Token: SeSystemtimePrivilege 4572 WMIC.exe Token: SeProfSingleProcessPrivilege 4572 WMIC.exe Token: SeIncBasePriorityPrivilege 4572 WMIC.exe Token: SeCreatePagefilePrivilege 4572 WMIC.exe Token: SeBackupPrivilege 4572 WMIC.exe Token: SeRestorePrivilege 4572 WMIC.exe Token: SeShutdownPrivilege 4572 WMIC.exe Token: SeDebugPrivilege 4572 WMIC.exe Token: SeSystemEnvironmentPrivilege 4572 WMIC.exe Token: SeRemoteShutdownPrivilege 4572 WMIC.exe Token: SeUndockPrivilege 4572 WMIC.exe Token: SeManageVolumePrivilege 4572 WMIC.exe Token: 33 4572 WMIC.exe Token: 34 4572 WMIC.exe Token: 35 4572 WMIC.exe Token: 36 4572 WMIC.exe Token: SeIncreaseQuotaPrivilege 4572 WMIC.exe Token: SeSecurityPrivilege 4572 WMIC.exe Token: SeTakeOwnershipPrivilege 4572 WMIC.exe Token: SeLoadDriverPrivilege 4572 WMIC.exe Token: SeSystemProfilePrivilege 4572 WMIC.exe Token: SeSystemtimePrivilege 4572 WMIC.exe Token: SeProfSingleProcessPrivilege 4572 WMIC.exe Token: SeIncBasePriorityPrivilege 4572 WMIC.exe Token: SeCreatePagefilePrivilege 4572 WMIC.exe Token: SeBackupPrivilege 4572 WMIC.exe Token: SeRestorePrivilege 4572 WMIC.exe Token: SeShutdownPrivilege 4572 WMIC.exe Token: SeDebugPrivilege 4572 WMIC.exe Token: SeSystemEnvironmentPrivilege 4572 WMIC.exe Token: SeRemoteShutdownPrivilege 4572 WMIC.exe Token: SeUndockPrivilege 4572 WMIC.exe Token: SeManageVolumePrivilege 4572 WMIC.exe Token: 33 4572 WMIC.exe Token: 34 4572 WMIC.exe Token: 35 4572 WMIC.exe Token: 36 4572 WMIC.exe Token: SeIncreaseQuotaPrivilege 536 WMIC.exe Token: SeSecurityPrivilege 536 WMIC.exe Token: SeTakeOwnershipPrivilege 536 WMIC.exe Token: SeLoadDriverPrivilege 536 WMIC.exe Token: SeSystemProfilePrivilege 536 WMIC.exe Token: SeSystemtimePrivilege 536 WMIC.exe Token: SeProfSingleProcessPrivilege 536 WMIC.exe Token: SeIncBasePriorityPrivilege 536 WMIC.exe Token: SeCreatePagefilePrivilege 536 WMIC.exe Token: SeBackupPrivilege 536 WMIC.exe Token: SeRestorePrivilege 536 WMIC.exe Token: SeShutdownPrivilege 536 WMIC.exe Token: SeDebugPrivilege 536 WMIC.exe Token: SeSystemEnvironmentPrivilege 536 WMIC.exe Token: SeRemoteShutdownPrivilege 536 WMIC.exe Token: SeUndockPrivilege 536 WMIC.exe Token: SeManageVolumePrivilege 536 WMIC.exe Token: 33 536 WMIC.exe Token: 34 536 WMIC.exe Token: 35 536 WMIC.exe Token: 36 536 WMIC.exe Token: SeIncreaseQuotaPrivilege 536 WMIC.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe 1384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 4572 3156 cmd.exe 82 PID 3156 wrote to memory of 4572 3156 cmd.exe 82 PID 3156 wrote to memory of 536 3156 cmd.exe 84 PID 3156 wrote to memory of 536 3156 cmd.exe 84 PID 3156 wrote to memory of 724 3156 cmd.exe 85 PID 3156 wrote to memory of 724 3156 cmd.exe 85 PID 3156 wrote to memory of 2304 3156 cmd.exe 86 PID 3156 wrote to memory of 2304 3156 cmd.exe 86 PID 3156 wrote to memory of 5032 3156 cmd.exe 87 PID 3156 wrote to memory of 5032 3156 cmd.exe 87 PID 3156 wrote to memory of 1044 3156 cmd.exe 88 PID 3156 wrote to memory of 1044 3156 cmd.exe 88 PID 1384 wrote to memory of 2716 1384 msedge.exe 97 PID 1384 wrote to memory of 2716 1384 msedge.exe 97 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 1300 1384 msedge.exe 98 PID 1384 wrote to memory of 2652 1384 msedge.exe 99 PID 1384 wrote to memory of 2652 1384 msedge.exe 99 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100 PID 1384 wrote to memory of 3936 1384 msedge.exe 100
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\serial_checker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get model, serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber2⤵PID:724
-
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber2⤵PID:2304
-
-
C:\Windows\System32\Wbem\WMIC.exewmic path win32_computersystemproduct get uuid2⤵PID:5032
-
-
C:\Windows\system32\getmac.exegetmac2⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8010646f8,0x7ff801064708,0x7ff8010647182⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2036 /prefetch:12⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3696 /prefetch:12⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,10511394103534018946,16120044125488250818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8e4452d2-50d9-4b1b-9051-cc189102ccab.tmp
Filesize6KB
MD5876591793919e534f729f7cdcc03ada4
SHA1835cf6e104a801a94b331ee48d85eb0a18967cd5
SHA25630653ec16b29e42cb2526f40c9cf14105adb3e39eec13bc9590db50f7526be49
SHA512afe08b23c7c7aeaf98f78961ed8e7ab4bb1596c54684654300a8dee1e6056a9f31555d0639c1db7613624268309d23fe03f6eb59dc45dc0869a88464f30680e0
-
Filesize
5KB
MD5ca18b21c97a80948fd4d71a152ea2b38
SHA12c60750f9d72c1fce4f8d5ca8ea0c3abfb99b42e
SHA2561fec05574ea0a13d9c1878ed4f983164a7a2ed3606aef36b46319a650cb545a8
SHA512fd18b67453b994db201665d760deb6a30d702195767de8a29e062d769d23406e34ce3aeb69d08972deba843960ab4c856ab4d8dbeb1872ae0915f1a5616fbe5b
-
Filesize
6KB
MD5c48065608122dfeb22370c1fb89439b1
SHA17ae2d461b490df1fa69546158c4813df56717a52
SHA256715aae59e50626f8b3ddb414553e3124a71757435079ca684da9beab219b2184
SHA51285aeb1bcf621e1c8fdaf81dd8807c6b1e8abae55b1122f542e46d88d712e9d21f0a82f8a45beeed8df0fa8c9c70245ae4de10798f319c1ebf2cf8dd36c02d750
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
9KB
MD5787464d30e5ea7c9df1225150140428b
SHA126ad4e41a1f8c9dd17e961ffa679e378cf506a19
SHA256def70eedd6f8ebdd837f00448acf9114e0ff35b5a624203bfca4d467df3ce4fb
SHA512bf1491fd2ef2690f129c4bf267189d0f23d7feac8970e210a58ad512b92e33761ed97d9564b46dc499363285e69771fdaa533db886bbc3f23d7efd64707ea7a8
-
Filesize
8KB
MD5815c67f496f9b9e5a3a803e087cb728c
SHA1f272f3876dc24551e3e6b1af83c9e75181cd06e7
SHA25627a35216bab5a527c8404b469e373016b06c37c64d0cb820c6ffa1369469a9b6
SHA5127623d3e1e71bee1996f0e959d7247bd88478a8db805e25082eced52faaa3c478b847456e5e2018c1348e55a090b7f5ea936311dc8ce0f4894b8948e215254d1b
-
Filesize
264KB
MD58de86c645a44231ab87a17a2f5f7cf58
SHA133e1a638c61de6f700be1963dda1e41dda0aacc9
SHA256aff89e62e655f0176c190fca2e70313f5e2c9f2c4be04c04e5083ef0e4a05f59
SHA512eaf44222ccc4a13334512436cc6730bd5377da51ea30317519f4b8f4bd04d99278888a20958fb12c779ab41b8f90c4011bf673b50a339e59400e8fd067775ec9