Analysis
-
max time kernel
42s -
max time network
43s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-07-2024 09:24
Static task
static1
Behavioral task
behavioral1
Sample
python.py
Resource
win11-20240704-en
Errors
General
-
Target
python.py
-
Size
9KB
-
MD5
15f2f2994d6e2f6cf2f1ba635566034d
-
SHA1
44b4b7d719c587f551c6db10f2f58890ec24eaa9
-
SHA256
acd21c48e28cb60e6445c521aa28aeb9e4957eb69b3830761be8786a62db501e
-
SHA512
ecab0eb2ee22db70acdfe3811f1af710d0731bb27d10c4eb1d072fa583350a43be9acacbdf5c367ec4b0fd525e90fd22376c1ac24317699e3439d675d055bd0a
-
SSDEEP
192:EW/tLBO2VaS2fUOm3hguWH4Trswix0Uwl9c9v81I1Ikw8z8pQcgZScN:EW/tLBO24S2fiTorx0Uguh81QTw8z8+N
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2608496357-2693146533-2740208290-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2608496357-2693146533-2740208290-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\winnt32.exe NoEscape.exe File created C:\Windows\winnt32.exe\:Zone.Identifier:$DATA NoEscape.exe File created C:\Windows\winnt32.exe NoEscape.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "243" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2608496357-2693146533-2740208290-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2608496357-2693146533-2740208290-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2608496357-2693146533-2740208290-1000\{B86385FC-77F8-4421-A8CB-A2C6EE8E42A4} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2608496357-2693146533-2740208290-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\NoEscape.exe.zip:Zone.Identifier msedge.exe File created C:\Windows\winnt32.exe\:Zone.Identifier:$DATA NoEscape.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4980 msedge.exe 4980 msedge.exe 1900 msedge.exe 1900 msedge.exe 4800 msedge.exe 4800 msedge.exe 2532 msedge.exe 2532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe 4112 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4912 OpenWith.exe 4484 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1824 4112 msedge.exe 85 PID 4112 wrote to memory of 1824 4112 msedge.exe 85 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 2052 4112 msedge.exe 86 PID 4112 wrote to memory of 4980 4112 msedge.exe 87 PID 4112 wrote to memory of 4980 4112 msedge.exe 87 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88 PID 4112 wrote to memory of 1072 4112 msedge.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\python.py1⤵
- Modifies registry class
PID:1264
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\UninstallImport.svg1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb156b3cb8,0x7ffb156b3cc8,0x7ffb156b3cd82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1956 /prefetch:22⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3924 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5756 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5752 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1808,167700182191934175,6851069265679213574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5644 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1324
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- NTFS ADS
PID:3896
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a29055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4484
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5be6d8a5227798b38c33128c43f9febf0
SHA1b5db7c6a1593f45c75ebb6a81e57628d11fcb892
SHA2567eaf875fc88b9d5125a56f088e3f676d1762503427fb6b94dbe0eaef71c23234
SHA512e34ec91b098f08c06754d1e873acfa7773e696dcd2f7be1b2cfe83962944cdbc59703511341d95ed8e5e0aea8f28c9d7b7b497cec719e7a771e6b5e5f6c28368
-
Filesize
152B
MD5dd3589b97978441d244d4e821fd239da
SHA163286c2b1fc75939d6ad4e1176901b5c7dc58143
SHA2566ddace977f58c209176969a77634f8a7cdcaf6f1a550cdbc056674b2b538a5f9
SHA5126a6a16c168445ee2511c363b31faae8bdd851259ccbdcdd8e93584dc076e1bd688891e5804479a1313019428387207b7a2ba23fe854c53ac86467c730c25b4c2
-
Filesize
5KB
MD576b43d239681171e2b1124c388d632df
SHA19955ef97135e43c2b3c5394e2bd97e75ee77954a
SHA25697128743a6652d0fe898dc8cf75f097a10c5a75ec64d27f37b4743a602484f2a
SHA51292cc62a62a12c3322f74e61ed6e79c6fb848946dd32270f979e513379df706864ea54741cb19ce30308001924abfa9326a9d16dd8cb0308a3780fc31c62b1eb3
-
Filesize
6KB
MD507cc84cdcb1e564bba97cb0ce5b9a27e
SHA14c285bb79a5061bb9083f7f5e77ea263bfd264e2
SHA25621f7396fc18a95870a6e8a3c6a1b86a5e0e7e66b7af4b72d1b008c346d05f39e
SHA5126e87161d33c753fa753da686bd2060594574ef6d5b948d696cdb144b6395b2c313ca9afd70061a5c0a6730b700243ac07f9d5d1960d86ba88265f252ea42c73f
-
Filesize
6KB
MD53583cc2a3a366d850a2b9470fcc5c13e
SHA1557ccf8ab864853eedae34163ff688569ee52c8d
SHA25682847267092b7e8bab91bb72a7c198607a042548bd6f6e5ab3747732579c558e
SHA512d142184d60a96a121a0c46f952131d099430c43cab9bb3860cb97f9fbdb0c0aeda73d9d9fabc5b7bf97a359e83f06672f565225fc32d74f5386e0af19a00c0e2
-
Filesize
1KB
MD5f12e6d131c7d9bc73cf2c05779c91492
SHA11b30539f631458f6a82027582316d6240c4c5d60
SHA2567829e4245b38bddd00d1c1fe753ed67dee6deb7cb76afac173cbef92266bb500
SHA512837a841404131de87336a47645dd29d3005c9c4fc8b4b69594daca10f4f929032390cb28de26805a90d22db9614f3ca8beb33617eb13be58fa5dfaefff5dbb27
-
Filesize
1KB
MD512440edf7cc505b583451c6700499db1
SHA179a7662f212cc28516cae43c8277198e5c5d494a
SHA256902bdc6ca3c8e257f9ff82c457049d2965cdf5b2e20c36703913846cd4110afd
SHA512b0cd0faa90e9ee4954ad414dd5ab20c77bf7f9ab033877d5964db177439e602d9ef3af7c0d93d1155e5c1026df8fdfe5b7e631d496ceaa083bfe9b0b6ca40de7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5567397ba7b12d8168b3ef24fcd1f7cf1
SHA1e9cf531d2fbcc12139a04697c4c50d1282cba645
SHA256964d716fe0c9dae83ed8e165e3d700c623cb903fa60a4b7ccd8a22e36616b234
SHA5125c053b86d7e2780418633ced6af58ce750fad0399a40b8463f0852253e777f7afa09108b69d87cb9a86602fc5871f35b55baa656d5389251aef1806bddcbb5c9
-
Filesize
11KB
MD5250aa5938d2ce6042b15097902b53fd0
SHA19e1c84d87ea6c4647fa7f9b1b05e9e1312132b05
SHA256e93d001f1ad233f1ae7059595367cb404b8ca8d6dee4bf8b08daf4525fcee99b
SHA512f8275846482986be08f977aeaf7b8a3c10309242a59b1b3530201eefe5167c1295dd1d95f5a2909afd855417f82239480b245c8f59aac006fc9d3673ee3c5d27
-
Filesize
14KB
MD57d812e76d5f11437f529cdb4bed3e2ff
SHA14ad7e9ac07894a290f97823b9a99af5acb040ad6
SHA256ead257271d70bb2139750ea7d2c8194c877a92e1899db791feb9b072c0af59aa
SHA512697a122fac295bfd394d402d50809317bdb7f2027997141e0197c01488d23644e3dabf8a2679984d21b986535edec31b8bd5a10f9f909068bc88e8e161760e1a
-
Filesize
13.5MB
MD5660708319a500f1865fa9d2fadfa712d
SHA1b2ae3aef17095ab26410e0f1792a379a4a2966f8
SHA256542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c
SHA51218f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4