Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
245s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 11:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/etherealxx/limbo-godot
Resource
win10v2004-20240709-en
General
-
Target
https://github.com/etherealxx/limbo-godot
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5392 hydrogen.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 hydrogen.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-464762018-485119342-1613148473-1000\{34264F08-5C82-4DF3-AE13-41F75444D606} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 765041.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 4896 msedge.exe 4896 msedge.exe 1216 msedge.exe 1216 msedge.exe 4948 msedge.exe 4948 msedge.exe 1896 identity_helper.exe 1896 identity_helper.exe 3580 msedge.exe 3580 msedge.exe 5720 msedge.exe 5720 msedge.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe Token: SeTakeOwnershipPrivilege 5392 hydrogen.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe 1400 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5392 hydrogen.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2904 1216 msedge.exe 81 PID 1216 wrote to memory of 2904 1216 msedge.exe 81 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 2236 1216 msedge.exe 83 PID 1216 wrote to memory of 4896 1216 msedge.exe 84 PID 1216 wrote to memory of 4896 1216 msedge.exe 84 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85 PID 1216 wrote to memory of 4708 1216 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/etherealxx/limbo-godot1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe886b46f8,0x7ffe886b4708,0x7ffe886b47182⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3912 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6560 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2156,8067064563014819580,4079049030189458257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Users\Admin\Downloads\hydrogen.exe"C:\Users\Admin\Downloads\hydrogen.exe"2⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5392
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault2ca4bd1dhd864h4b3ch865ch56a222e9b8841⤵PID:5408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0xfc,0x130,0x7ffe886b46f8,0x7ffe886b4708,0x7ffe886b47182⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1181973219389683823,12706770307763571847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1181973219389683823,12706770307763571847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5912
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1400
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
152B
MD5c118e3d0e39099e8e035b0d15ab0f982
SHA1f60b75fe1665cd6ae4f3c9c419fcc26287ed2380
SHA256651286aa34deb46a2737ecf03090703e440285c01fe3b9b822cf9d2949e9099a
SHA51221f32d45c3e7a17e2d493be1793fcaa31e4cf26e115966744a5fed09403c9989434ab9eda82754693e7562a2de59080a2ebe1befae06ec02045c298459bc2288
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8b2e1196-dcb5-4dcb-a60b-ba024c21710c.tmp
Filesize6KB
MD587c3fbcb4dc66a42fcf05b171e8df854
SHA16d752b47e86a55e2d524770bee1d02ca4d75fe73
SHA2561634f166e64eb288b0af55f9349a117f3c68a635a415d15be9e1b98ead332d94
SHA512a99f6632bee670a49dfc0f5b201d3a398526023ec41fb97097186f3265214207ed3afeb14d9acc6717f3addc61045b47397dab0da80a2ff511a8a18a12e49129
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5ab88b01c84e7a8c38c66abbac5535f52
SHA1295f05cb3a6a68c01ef51ce7440ac11d600b1831
SHA256eab3b4c7939a958079ff06dc54bbf9625d4e4df25bc7e9bccfe28b8fcb1bfeb2
SHA512be8577eeaf4c78a720738f61192d92f8d82113169e31d86307034daee9284794aab7a969c10d95632556db843c90fd4599b7f1b56fb19b4cac3abe5b61386c61
-
Filesize
1KB
MD5aa8576f7906ca0c6349331abab0b3e00
SHA1f61c61bc5728c38ca3ee89c7249f19bd1b30655b
SHA25607a62ee8fef556a81695db3651cc5403687a2be000e07a9c7f7aa2c5d536a593
SHA5129ecb59614af18386f53c16cd85b9060fbe688286022190182fa98e8a1501dd797a59a6709d8f95800a1b74bed6f905461770e819ab1cf8d5a297b4e3c530aed2
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
1KB
MD5f7713d39c0775c5ea8f2a1345297dc8f
SHA1fe87a036537380109ee655ead0e73f6f57b634f8
SHA2567a85733b9bc9756570c3100d931f5d7a4618cbdeb0068649266f088bee9fc7a0
SHA512461f960357ab25fddefac01af24fa06984441ab297442c6d9cb769f3687360c5dcec120f56154c544247a6771710cd2048a3c694d5eb573a84e8880023051a43
-
Filesize
6KB
MD58b8202b897cce474a75c5647e2979fc2
SHA16a974f03f8ea23e73a18bde85b79f7843a48e82b
SHA256dea9489a68417d1763df6db7cc14a5171abf5e94af49a156543a2634fb33f4b9
SHA512d55a373244c1ae0da4f1fa05b6624d6a5b851b262668cb7b46473e92abad5a6a2f7a9da4f6813282be97913861d23b36ebb770acd5691508a65420a4d60e7d70
-
Filesize
7KB
MD58fdf8c043679163bfdfa1135bc2a47c8
SHA125e94ea1db1ab2c3eeb5c696066b3c14ceef6a7e
SHA256b0e0b5ef3a459a8ebd3885c7a9cab51106bb09f2c95eb400a260b8db5d7c052b
SHA5129d79299d57cfdba0ba410a478804c07b227e2f206f80838bcfeb8d31694e3f8541291410b355fd7f5bfd721382a88f283c76e5907857503d7bf3f6403a915de7
-
Filesize
7KB
MD5ef6d6767d1ac0cfb93e97bfee9e36487
SHA125d3b53f41c3bf0c5ba126a435891e789661cec9
SHA256f4ecb97edd655849f9fb1076fbb9c5a37e7dc80e49ebfab18099f7cb294ed455
SHA512e11970a54f980c830b2ebbc53069644b21b96090bb0ea990092248eee7659189b7bf86e5c8da6914252bfa1f5c4ea4bdad7a1d796bc9935db25b13c2cad4152f
-
Filesize
7KB
MD5bd163bdb5bcc10b8daacd19beb4a5dac
SHA17e9084910d2f8e03647a801a10aeee6a6c93fe45
SHA256deee907e7bb89b899934fe13747caeb66eeee73c41a3e0a82b4a6231acb06a8a
SHA512fe6bc87d8b1a3d62e473aa6611657f096b96b0de92fc6224addabb1abd41fbb96cb7079ac1851cd28c9ac90b3b2ff12f28e1c278d3036cb4522dd3ae384a6c7e
-
Filesize
1KB
MD52232c81d8a523543e6a5895969cd6d9e
SHA1aadbd3733ad764df6ddf0621deb9593e8d1e3731
SHA25655b0b1bb959f6e8c1e9ecbf1e167dd4ea0e5d868feabb3d216d24c4b9beadcb2
SHA5129f20742279d17f90917b525391ffb7dba6c8b3c19360b204da2c69d5c195a0a6d09c2c034aa999021af5588a7f354c400fb94019e85d5148f22b4035fe0a0210
-
Filesize
1KB
MD5ab401230cc29f7a76574b57240603f46
SHA188f88507e73f0a54d86eb1883a2c7c788e22985f
SHA25614cccca1b9acaf8fa9170befa94f1326c2337a3c25f3cbaf8d53b33678c30b6f
SHA5123a8ebc766d4668a84ad8715baf3511404f535ac6ca924a3cd59bdad07e664741b7b4222aee6ec7ad540293b53a5b620652c15d4491fae92697882fe1dddebbcd
-
Filesize
1KB
MD5b5d0b9effe8bc482826b2c8d22885339
SHA1e90d0f29f8bdf052b3c5b1f3ea4d1b8d36ecf8de
SHA2565d5a39926da285bead2972522ca773d32784c8b074632bc63e22ef417464bbe2
SHA5127f5269e2ad3d661cbdfced59e34c1b52360c3a844720bc32c246eaa4dbaf95d4feed6fdcf15a407a9706613227720ccd070d8f22dfd3b36800d544f9a1c2898d
-
Filesize
873B
MD5e52f0a734f3ca4a8a3f32dce96e4c339
SHA15c8dde2fad3e905b1a34a69fe070056b9ba2c862
SHA256722057ba422bced002be66999fe8726894f223556aea21a1cead2579d07cc6cc
SHA5120828ad1bf29699949efbd911c686da20021411bcbcaf76c42e17e065fcca6144ef1b252d2194f61eea47e99d1736b261d2a2655bfba278d98d699a8604ef6c22
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5cbda331748ca4053fafe5a37118c6d02
SHA10764e074bcaad41c7904e72d1bbdaf737e92fda3
SHA256c533c5b02b1dc9b2f985119fbdcb2190b076d87260062e1fdb678238a2415684
SHA51280c96573fb469231550a2a1c8233e33d015e6000a985fcbfd8524eae27a17c3652b88257064f59ccee41c5cd897a8f8467d9abb886a00233bfb8754566290ee1
-
Filesize
11KB
MD5c294f539234894ffbd728f69cabc3ae3
SHA154b2c13e5884cf8cd326af06f9acdf254e112898
SHA25637dc9e2386c15f08572533cd32f33c5c075e66200419dad0409dfad44d2c7c51
SHA512e529f1b0cae8d03a043ebab8abef9869c3341c364884abb81ee69da79635b4b356ab98c329217a3de8011bb26322a3dbd7d6d2118460e5e2cce8bb8723c14be9
-
Filesize
11KB
MD52277131f67716acda765151c1f598fdb
SHA1317abc63aa745ed3db4194e6ba1898b869dc2f68
SHA256b8ee169d08f385df978239344dacbcb9c7eaaf25a4b9b83ad9755e4fe47d8f45
SHA5128bea5e7ba12033f85f122056e086d2c8fab4b8f9f6a7e44a7e72b0babd532b2bd34fd0f72916b420fa7beafe1e9550cab9396ff7f2218708dca7e613c3f21de4
-
Filesize
12KB
MD534ffd8f72fcc6247e988a95dd5960b24
SHA15bba64b6a2eff0f240dfbb8b55415f2298d82831
SHA256b236f9bd27006757222ce13cb56d85b09472732004a559ab8c3fbf7b765dff2a
SHA512b6e5ec3b2d667638cd585a6d2b08b1eae58811578f4b372b086cb2705a9d894979940ccaed8aef3eda51fad3ef9dc4957930b36985db87621907b2f38f0101d0
-
Filesize
128KB
MD5efdd98ae7ba8aa1a457d6938d554e5bb
SHA15adc3d12792396b569bf024676636262bcd9c7ff
SHA256283f195bad35cac6e9452c2791eaeb90d9cd6d506aa16c6505247e5be74aabf0
SHA5126c1e6adfcf7416c153b8f57149d232bd3caecda0806369cb00131e0877559953041017a641f910e7360ddeb059e568c4c4bbbbed28ed902f80221a68f1bafae9