Analysis
-
max time kernel
108s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 00:10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/pxIl3M
Resource
win10v2004-20240709-en
General
-
Target
https://gofile.io/d/pxIl3M
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 5088 winrar-x64-701.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-701583114-2636601053-947405450-1000\{49AE5ADC-8F5F-48A7-B374-975C56C76333} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 376864.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 3244 identity_helper.exe 3244 identity_helper.exe 5116 msedge.exe 5116 msedge.exe 5612 msedge.exe 5612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5088 winrar-x64-701.exe 5088 winrar-x64-701.exe 5088 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 976 5100 msedge.exe 84 PID 5100 wrote to memory of 976 5100 msedge.exe 84 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4112 5100 msedge.exe 86 PID 5100 wrote to memory of 4832 5100 msedge.exe 87 PID 5100 wrote to memory of 4832 5100 msedge.exe 87 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88 PID 5100 wrote to memory of 3704 5100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/pxIl3M1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc72146f8,0x7ffcc7214708,0x7ffcc72147182⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3976 /prefetch:82⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6000 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2680 /prefetch:12⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:6092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:6100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6608 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6740 /prefetch:82⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2088,8783353806810938518,1649104396842193511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5617401eae9bae09b962a1c4004a9c3e5
SHA1cfe560df0d1a8a5bee2f14f0f1258772d3c4ee27
SHA256a43ea5ebce19014129f66c2e1fa140edace5aafe0bf1d59d004a6e6b4e7027c5
SHA512e47b8efd77c983158c4aac369f81c456c1f57687fecd86cef7a11be1b0833acbf885c52eae1f275c49fe0c11bbb8457f334aad4c5f1bd28e8d65fa0cb325d1cd
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
67KB
MD51d9097f6fd8365c7ed19f621246587eb
SHA1937676f80fd908adc63adb3deb7d0bf4b64ad30e
SHA256a9dc0d556e1592de2aeef8eed47d099481cfb7f37ea3bf1736df764704f39ddf
SHA512251bf8a2baf71cde89873b26ee77fe89586daf2a2a913bd8383b1b4eca391fdd28aea6396de3fdff029c6d188bf9bb5f169954e5445da2933664e70acd79f4e3
-
Filesize
64KB
MD5d6b36c7d4b06f140f860ddc91a4c659c
SHA1ccf16571637b8d3e4c9423688c5bd06167bfb9e9
SHA25634013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92
SHA5122a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487
-
Filesize
41KB
MD578b45f66500680832e342e6fb8f0c7a0
SHA1457528aace12ab0b6487a490d7b8a6adb13dc8f0
SHA2565cb9b5d3fb0be382aa00936369c7589c938a438c3942c9883072dee465458c00
SHA5126c1aad5408b7c02a828596f5030fdd310b78b79dffdf3b3dd997aa26802b55026bc18d7fff44a0e3fadef8087b43964262a9894fd4fc06de1b229bbc6d3b2b1d
-
Filesize
19KB
MD52e86a72f4e82614cd4842950d2e0a716
SHA1d7b4ee0c9af735d098bff474632fc2c0113e0b9c
SHA256c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f
SHA5127a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1
-
Filesize
65KB
MD556d57bc655526551f217536f19195495
SHA128b430886d1220855a805d78dc5d6414aeee6995
SHA256f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA5127814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb
-
Filesize
88KB
MD5b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1386ba241790252df01a6a028b3238de2f995a559
SHA256b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16
-
Filesize
1.2MB
MD5931d16be2adb03f2d5df4d249405d6e6
SHA17b7076fb55367b6c0b34667b54540aa722e2f55f
SHA256b6aa0f7290e59637a70586303507208aca637b63f77b5ce1795dfe9b6a248ff3
SHA51241d44eafc7ade079fc52553bc792dace0c3ed6ee0c30430b876b159868010b8676c5302790d49bed75fa7daa158d4285e236a4be3d13f51ff244c68ca6a479ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5f077098d412f0277db61f362b25b7450
SHA16253cde973c4206499da50f4a50be9bec88560d3
SHA2560330e7f0a6c58c1366236c1d947dbcb5ce2ead986d3915d613827b25bfabe688
SHA51259eba2b18588d297ab214a3bbd6adb682f378574ef4f09416cbfef98cdd7afa61083c248bf98ff3ecd424fa36f1dc8bb1af27c28f0c7b6019fc56cf231681e72
-
Filesize
1KB
MD53d735c1d55b2265f91da945d9532ee00
SHA10f61150c09ee694217a6244dd43616e7b88e88e0
SHA2568a3aeab8bbdc5a49cb52419b8b8af8ff2ebf683820019388855c07de026b5b3c
SHA5121a5930fa5874ac4bb71ac956c51e09be4b52b551264447288fa0c4601cdb8b331fd98f71863c9844b23844f5c1065191e4177a806c62a8e1152d2689300b17ac
-
Filesize
5KB
MD5cb6bdd3a800dbaea7f4ed522418e81d4
SHA17a3dd0754e62b923294673a68a3d2389c3190592
SHA25623dde3cd4cb826def038e83111f76605065069412bb2ba4eaaed9de58407059a
SHA512af5d5c6c271e42e5216ce6d8a8806a75f479b4d8b066a2f10502ecad08f35806658871cd07aa7e8935ccf0176a954eb9a2a6f144d0be6cbc1be42508d26c7c21
-
Filesize
6KB
MD590009b559daaef53fef1b4d89547b176
SHA10d9a22ed0f128c0700f29afcc4275cdc30c5e980
SHA2568a261a176505dce17c64f93c1381fa8582e5b4011bb0bbc5ad0541176749050f
SHA512dcef40a90ee51ae2200594a9b9089584830bce2e579275a251dec171d93cc4a13a85999003b47148d00046548abb9c6e4fcd0e0b58cd3f4bd4946e1a886d7658
-
Filesize
6KB
MD552c305e740a3586742bee07d3e77b88e
SHA10631f029305e4adc05ceb48374f14997dfaad8c0
SHA2568bd2921fdc75b58a924d874e065fe3e4921f292c45af3d80804ef64cce3720fc
SHA512d36b5c3a4530aa85a032a4cb809b48044b89065039ca0a7683fb1b7da08c7ada89bce815bb7b3f78d04d5a13bc0af4e0513ed0c34dac87656c8b84b083b2ec9a
-
Filesize
7KB
MD5945ad9071b559eab61c7c1a31c599440
SHA10aecf304ddb12e8aab8db5f86f710bd28a56e28f
SHA256dc49c290f35c6694488056a5872cb01bf235924796330169d6ce52f9501739f6
SHA51281dcb31b89fcb0b57ab23b082d6fee498e12180e4daaf5d5763a81782dbc8d8212ae4bbb046971662641d9f0443d6ea78d9d46f1f8f3cff990cf8ea2ec99d52e
-
Filesize
1KB
MD53cf70524a1974d741363532ae7d4be8a
SHA12d3e7ad3d1af89d68c952a96b436bc86716e1ce3
SHA2566b2b4b5b69c093feefa7d7813b36ce2035a41f7b9814ff2ea2bb06ce6403c776
SHA512b35125e9c63706b3dc4e8102b64879951097cf87a360b078a4904654849d99f99162993d60f3771cd7f3c8800c2bf52dc3024345f544d3f0f1a728054d95c473
-
Filesize
1KB
MD5532a374b6299901178ef581048848592
SHA10be440e17054a307a6f1518f365699c0ccbc6ab7
SHA256815868df974ef66d95bf813347d484ff2355fbc0c2bf3de4bc9e7892f6123c00
SHA5123cd420fb7adbe4d285e6dd96acc90f4f20961a008e4abc62bdb72e63a9945b5137a19c1efd337047ad980b564611c460214dd9860fa63c0d83078bce6f27e2db
-
Filesize
705B
MD5d937c14f8a714e6aa6b1a8bc9f41c3e8
SHA1aa7ce69d31a709379386e2343d8c2b24f6b032c7
SHA256e68877414a99ceb418b68a1a8c994e49ca5bf5911044b01fc0f361aa052a27f3
SHA5126e1eeb451e646da280a78df2670053da7df6681bf44e90c9025166d455c8a38c15c8ca666f41a745d3b63180bbfee0dea71252fd93a723f080d201fd8ca61c78
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD58573da0b7893d78d5d8ce94ef572b7e7
SHA13366c58f7891698bcd880f1a8ec6a3aaa5b80c40
SHA256b3ca531cc5a6746c2ec95c9ab418c6a31ae3d8f2865639306810e93ed6f8641f
SHA51224958d4bc24ed46d9ae0af59a85d7f665e6a19b010e63942a21a711ab1bfbc4264ce75f7da1cbed452a7f61938fa4cb765baca7846c2c797fa57515e9732b956
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6