Analysis
-
max time kernel
265s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07/07/2024, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
file.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
file.html
Resource
win10v2004-20240704-en
General
-
Target
file.html
-
Size
312KB
-
MD5
bb1130287bdd5f532527950612b83c1e
-
SHA1
647c0f43416d8ea6404846294f756ec401957ffe
-
SHA256
294aee90b4f67553ed3654dbadf0b22f0841727efec8de3c698323deb4f7e2e3
-
SHA512
7a91dcdcee7ca21cd1d280da27dc599888d54c7f5d39713c21633eba19d0c44cda2efbed5788b8de0d7451a0e14c14420d27d05c8da620d03909c74c8dd6e02c
-
SSDEEP
3072:tiwgAkHnjPIQ6KSEc/JfH1PaW+LN7DxRLlzglKJVfbk:LgAkHnjPIQBSEYVPCN7jBJVfbk
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1080 winrar-x64-701.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2494989678-839960665-2515455429-1000\{8BF3F0EB-D288-40E6-A6E3-1B971FD8A47E} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 997283.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 4636 msedge.exe 4636 msedge.exe 3468 msedge.exe 3468 msedge.exe 4784 msedge.exe 4784 msedge.exe 4884 identity_helper.exe 4884 identity_helper.exe 384 msedge.exe 384 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 1068 msedge.exe 2484 msedge.exe 2484 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3724 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 3144 OpenWith.exe 4220 OpenWith.exe 4220 OpenWith.exe 4220 OpenWith.exe 1080 winrar-x64-701.exe 1080 winrar-x64-701.exe 1080 winrar-x64-701.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 3724 OpenWith.exe 2976 AcroRd32.exe 2976 AcroRd32.exe 2976 AcroRd32.exe 2976 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3468 wrote to memory of 4592 3468 msedge.exe 82 PID 3468 wrote to memory of 4592 3468 msedge.exe 82 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 320 3468 msedge.exe 85 PID 3468 wrote to memory of 4636 3468 msedge.exe 86 PID 3468 wrote to memory of 4636 3468 msedge.exe 86 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87 PID 3468 wrote to memory of 3040 3468 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\file.html1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8a8e146f8,0x7ff8a8e14708,0x7ff8a8e147182⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2380 /prefetch:22⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6800 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6996 /prefetch:12⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5988 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6804 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6400 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2536 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1352 /prefetch:12⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6152 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7120 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3604 /prefetch:82⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2172,13401525312430285357,5128606314678931574,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3144
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4220
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4952
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2436
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3724 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\adobeisdumb.rar"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53c78617ec8f88da19254f9ff03312175
SHA1344e9fed9434d924d1c9f05351259cbc21e434d3
SHA2563cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed
SHA5125b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c
-
Filesize
152B
MD509c7ae658385f6de986103443217840b
SHA1298d880503edce4413337c09d3525f27a2edcd28
SHA25691e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7
SHA5124e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD541118115fa29060f1c26b0db67245d31
SHA17f27db986cfb4842c322c79701d6a5473e6b6634
SHA2560a60aa0842b8976687f2cdbc81207f339f177d65a731d74cfa63bfb7a6ab2a03
SHA512a952971d5a05ec9820fa1741e7e969675ae936b8134c4ad1f6554f1f0885977d824ff4976ead1503b6adef9c2548e2bc0575406588a7a7f954d538263a2239d5
-
Filesize
2KB
MD5ee6eb13e071b99a87a392abe16d998de
SHA1019d81c9267e9e15ed7c2550b30e135810b8bde3
SHA256eb1d38c89b36cb35bda191b25705a87b25466dc725ec075059d5eff130fcc73e
SHA512f3f5be6b2fb6fa28ea650e12613281d51bf8533e44fb16831d3bff8c164f6a076932d6226b8d6ad0471cbdb649b0ecdf104c9ccfc83c88de4ae7d01105a72a0d
-
Filesize
2KB
MD59fc69b9716e6ee7e18f733efc9adbecf
SHA1a3dc5887ee8fae2e2df490669d356e0a125142cd
SHA256ec57eee085b861600f18cd3593b9aef22c7e3c2873536e505a119560483bb383
SHA512e59d883cf7d277db2edbdbb6ced77f6b610ec04fdcc1413836d63d83307d4dca8e276609888a58137758c72b6ea8ba393ea2cbcf31e988a58ec60033c4461789
-
Filesize
7KB
MD573e82bb3d0577b3f0ef7b7141b11c04b
SHA15d88dfc59e92bb2f717cb3c3f8374eab7fea9c00
SHA2567f08a9b0fe681a93c28c4d1b489996bcf3b6432a58f3182312e299f6cb80d775
SHA512c0f6b6855875a8d008ef8648e0bd7e2f1b27b7f4a7e2ed500478a213d3b04aa47a0e700252741e6bcffe7d7327feb3b6f4bef75b952d64f2f8b2996b726b3ac5
-
Filesize
6KB
MD584e8f3dab309e1017e62fda21b006f41
SHA16202a0427bddb3e4dd7ac6a7a54e4ac355eadf7d
SHA256da00fa54cdc616cd7060395fad2451d1931e9fc580c9b74659310547e6f07d3e
SHA51218a7655c1e6942ff06f18454891e8d7dda79f949394551381cb1394f052ac57307a2b801939393e862016fd3fcfb968c99e06fcfe93d9bce6ef82b59b937f401
-
Filesize
6KB
MD5ec5d92dbc2970b56f3d52b8fa2626060
SHA1de6269ba236568fedd425d84be257d627b90ddad
SHA2563daa1623c9e5a13b24e4df2e35d29f6f71d100c895b1e83040d4f5ef4732f220
SHA512cb167e16ad871123243a28343f691b7bfabcfbc40df89198a28b2faf7695e6a6ea766fe0258d37e27b9a089b6f0f0f360dbcb7710e566bd6962b81ffb93ab180
-
Filesize
7KB
MD550abafcc88ac7e8b771edb5d04ea00b1
SHA128a9285fd6c206bf5c9721bfb00357d3644d11fb
SHA2569093f61a2e520b4ce08fc5b0cbf854398066729dcfc023b48b3291a4cfb8d393
SHA512c31b0766105504bdcb911e9a0274d4c3ddf531f0ca7604474a1bc1542bcf7b631c074ee40c87a77c51759dde64bfa41cdbac944ffbb11ce173117c9abfb01a6d
-
Filesize
8KB
MD50454c858a2679c890f72751309872c99
SHA131e2ccb302405c692c93344ab19c874bb0cdeb8b
SHA2565d4941b33eec2431932206ce68241bb1e8b1300a7a3524f0c611639b838b4b08
SHA51271d8ddb39a6aaf52cd327053bf619936fd2eaee2a0e7480297a56a5c8b603c76b4d569ed678cfa415e3b4643c04b907fe7ee1090bbfe20521b8c4928c0db6bbd
-
Filesize
8KB
MD58e878688cfd7cefdbf5a903c96a433f4
SHA18d5bc37fe0152829496fe55ee9c67061b9cefc4c
SHA25669628cf4ddfc9937926e4ec125679ddb57505d1a336f8d51b1fba49ea118e4fb
SHA512b316b26e93f7eb4bb939a4af9b20291424cb687361bd0e3e2897db873aba11dc95bbc2ca9b265851ae4370803d12dadb62952ccda8b7589fe111b08ae142fd44
-
Filesize
8KB
MD5d621b7a78649730534f60394a58749ee
SHA19295d992e1f32c3175c38900a5f8d16c623f377b
SHA2564b8d9d7c10156586fa3ac7b675ce00abdacebac32ac3fb7253cdf08b5f63fe2b
SHA5129f852acd272cc853b57cd2d8a4e1ab29ba5dab28943e4d3c1da5bd649cf8034e9e44d5f57da11964158e6fb668fc4e1aff89593e8331608372d3e6c3c6a36eb9
-
Filesize
1KB
MD57753ecd726a882204f1ae95ff188af08
SHA1e23847999bc1356cee37ccf887bdee0fb7564837
SHA2560df6fb80bb6c803d9ccd96d03bc2c11ec0c190ca2cadb44b26af79a699b64f54
SHA512a96024e40158901865b761902aebb245a9f1896862aa220d8640876956d27e979e1c25f884f1794057e52cb806d06c95c25656646d94b835307f0814410efe89
-
Filesize
1KB
MD599ddf678814650c1bd85483ebee318a4
SHA1679f1652102f8bfa9db4ae7e18840a0b4e0afb04
SHA25680ae198d65e83b443c6e60db486ca9ee0f186353e5505a5aa1b37db0f476d681
SHA5129dd2821376dfbd89de8d3faf2a000f2232fb7e9308143f5532d946603da3b005d883bfa6d512c913785e77db94cf7c7db1cfb664aa8d22e3aa1f88ea42869664
-
Filesize
705B
MD5b8c4c69e6bafe3c1693664c784e55dd3
SHA10df6de5339f9a8427bc12e1e0f61f9ce63f7bd8a
SHA2560826ac54bdb3f7b3175aaaee6775307ad4ccbfcc329792aa39942a07485be0aa
SHA51265fc0815458f4b895fee62aa9b008d9567ff54ea2bc8d3cdb1337a2821e4f997085459006fcce8625576d4d688a6ed9afecdd1b122de2688445b1ac1c3dc7669
-
Filesize
1KB
MD5bb70608161b1c0179499f984006951b9
SHA194283cfd3c57c98aeee5a3801ebb5f3856f705f3
SHA256beb47a468c66e9d8b3c41b8c619a758a3824ee07c22acbecb0b831ee9a17f9b8
SHA5122dbd998d22a82731fb43780cbf0d423ecf36de3926fec236f7f1531d47149b3b256bcd1fe820db0acbdff74ae3311739d3cf9ac5edc478db9166ae8d7f765304
-
Filesize
538B
MD5969baa77b156596a150db81909d83dcc
SHA13b76fb59dfaa0622da8fdb0edaf331d96dcda776
SHA25672170e0e06eb33ed22821cf114eca62fc8cda52a573f9b684db437e9aa201cdb
SHA5126cf5fe7a969166f757e07304f530da17f3932d75b5ce5dfbd8cbbe2f3c0d90ea5dad705179bef0fa83975a67cd4ad7cc099f425e283e9a7252a402a6c6c7123a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59b11a1f8db2448bf80fdb649d384047d
SHA14d6a520da44809e7bfc4081065490e0895b14d48
SHA2564bb0d4c9108f938f92463aef3ea05c4cac85b3fe0dbee49fc034adf96641feca
SHA512c041b42920b5d6e188d8ce1eb3ee4d5550741398d0be523fefe9abf3e1fd776f0991ec289d616e6a18fb2ae4a6acb2ab94b2b6532f53681e63e6123f55caf3a4
-
Filesize
11KB
MD5580d10cf81a5ec3dba66ba89e1a3478e
SHA1eb9a8228636fea4584b61116f97489471896a1a3
SHA256935adc5a174566b75fc8bf526e78589e1aa5a1173016d540e460ca46c587bba5
SHA5120ffbc5becf7dc926b8b66877e724f7c919129041e1856fcd9d65404d0f3fc9dc7a56af6d3575152b4dba13c1c886b38a2d18e06460a1717d0863bccf2322b722
-
Filesize
12KB
MD5165ae3a2748177e2afb7c3e623052ff6
SHA1856dc6f42bc899a7bf42f86744fa01c9dfe4a5d5
SHA256bce7d503852808ae4a010f885191d56f74151cd75d211223a49dea5223e29656
SHA5127505a175ae8d3495f80fb3d66293c6e9133b5cb1da838a02ec2f3049d601ec1a0eb36167effd07512e658d6a4212b802272d5849a0b09c3e5d65599ac8742b73
-
Filesize
11KB
MD5aba1ee483301aaff4fc968ecba22ccfa
SHA187c84304077c79f8065fc47b3beb4795bef70b2c
SHA256a35e57ae56cad765e39cb4fe81ddf0008146203f06118b28cba430ef2e371e56
SHA5121b890afe59097cd20ca30284436430baacc3ab95601d15ff1161ee99555940bcd1abb9cd39fe0645537c9e5b6087025936531705b833b86aa281f08f96673141
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6
-
Filesize
9.7MB
MD52a3686cdb6c13f5d6d71c0ea56de0253
SHA1fecf79248f3acb52744f022cb7a6743a78ddbd93
SHA2569399eb8b82919b0929570f5730678fbb7f18544422dde0c11d6ebbd3c52d8820
SHA5129273ed015a4a91ef8213339708350ca642eee14e52e563e78c2dd9b413462cae295f73f1fe55561f4908640ab4a35a25f34f29f6172d41cd4c24805c6c461dd1