Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
20/07/2024, 19:26
240720-x5mkesxgjk 920/07/2024, 19:25
240720-x5evksxfrr 120/07/2024, 19:25
240720-x43v1sxfrn 120/07/2024, 19:24
240720-x4pndswcrb 120/07/2024, 19:20
240720-x2kawsxfqn 8Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 19:20
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/ZyEnEKQZ#Sv048IJySKlvq44CpWJWZPADFkfzqKJxqYXab5vEhXk
Resource
win10v2004-20240709-en
General
-
Target
https://mega.nz/file/ZyEnEKQZ#Sv048IJySKlvq44CpWJWZPADFkfzqKJxqYXab5vEhXk
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 2184 winrar-x64-701.exe 5144 winrar-x64-701.exe 5364 winrar-x64-701.exe 5548 winrar-x64-701.exe 1000 winrar-x64-701.exe 4928 winrar-x64-701.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2990742725-2267136959-192470804-1000\{7CE5DDDE-7CBD-462D-8527-007330A2D644} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 582299.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 2168 msedge.exe 2168 msedge.exe 2072 identity_helper.exe 2072 identity_helper.exe 5360 msedge.exe 5360 msedge.exe 5164 msedge.exe 5164 msedge.exe 5616 msedge.exe 5616 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4104 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4104 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 46 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe 2168 msedge.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 5596 OpenWith.exe 5656 OpenWith.exe 5656 OpenWith.exe 5656 OpenWith.exe 2184 winrar-x64-701.exe 5144 winrar-x64-701.exe 5144 winrar-x64-701.exe 5144 winrar-x64-701.exe 2184 winrar-x64-701.exe 2184 winrar-x64-701.exe 5264 OpenWith.exe 5364 winrar-x64-701.exe 5548 winrar-x64-701.exe 5364 winrar-x64-701.exe 5364 winrar-x64-701.exe 5548 winrar-x64-701.exe 5548 winrar-x64-701.exe 1000 winrar-x64-701.exe 4928 winrar-x64-701.exe 1000 winrar-x64-701.exe 1000 winrar-x64-701.exe 4928 winrar-x64-701.exe 4928 winrar-x64-701.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1512 2168 msedge.exe 87 PID 2168 wrote to memory of 1512 2168 msedge.exe 87 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 5008 2168 msedge.exe 91 PID 2168 wrote to memory of 3312 2168 msedge.exe 92 PID 2168 wrote to memory of 3312 2168 msedge.exe 92 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93 PID 2168 wrote to memory of 3040 2168 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/file/ZyEnEKQZ#Sv048IJySKlvq44CpWJWZPADFkfzqKJxqYXab5vEhXk1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd21ae46f8,0x7ffd21ae4708,0x7ffd21ae47182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2668 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:12⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1872 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6428 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1736 /prefetch:12⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6588 /prefetch:82⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5144
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5364
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6656 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --service-sandbox-type=entity_extraction --mojo-platform-channel-handle=3392 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:12⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2272,15346889370404365521,2463802346741563200,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1604 /prefetch:12⤵PID:6092
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2512
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d4 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5596
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5656
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\d0458564b88f40bbbb494692f39f06e7 /t 1488 /p 51441⤵PID:5324
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5264
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\de3fcbba62774fe3aa0e9cf114281aef /t 5564 /p 55481⤵PID:4208
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\878d594c645e4adf8f6f7f417a65fcfc /t 5448 /p 53641⤵PID:5576
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\0f5f306cd32946f8af4e1d30d16c98d1 /t 624 /p 21841⤵PID:6084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5f233dfa59e51527ec3bce98a351c6680
SHA13d620208cbbb50225dd28c19ff7744de2f5c861c
SHA2565a148bbb23654f5923f05a78c3e480ef6d52ada3e2ff0e889e4836f98dd6a63a
SHA5124dd6db7f41dbdd0fccce5373f7c3efaa6d34fd5a040e6b9506fdff0f070554620f55dc00d2ccbd55295e955fbe03c5a17bb4a7b98b0a4b58a6c114562115681e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5eba0b9fd14c18d8c6bd6172af920c9cc
SHA1106d5e7897240cb591a791ea37a4481b4a8fdfc2
SHA25676b59a5f992bd28fec2cb4eec98488f904e9380195bde5548e6bfcb0f7bd9c88
SHA512d87535695dd603101bdb2273bca47afebd44264e82d69e87dd1ac59e0a5a53b621b577d3fa637da171806e4c8d5832978c498bb2ffda679d093e180502beb48d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
560B
MD5008b2d56474db082fd765d660498978f
SHA1e5a4f31f84d4d2d341b3af3ec776a263d38d58d2
SHA256ab2455041c58f035e3d084f4273f7a299f79489836465db76d426cacfcd7fc0a
SHA5122dc2e48f9f381e93b8aabc75d1738df874e841c28a5ffa475ae36740e79ce0d29ed369ec55b753110ba11c44eb8c550e51b46631d71894edc969852653910323
-
Filesize
5KB
MD5a40e69765d9a7c6f5c58cd6b10e69a4f
SHA12b5c6f801a3a94fa81ee8bb721fc2e6309a0ea27
SHA256bff5a6e01a50a044e108a877420e6c257d3b9a626daea6084a59de71f8db68ef
SHA51290a254f2abcb257ab606ff429ec46b7b96067570deb8df9ed1af593210a341aabb5f858984d53a835b94d0eec35ff1b1fe9650cab0784f7db7da130326709116
-
Filesize
6KB
MD55ff40b9930fb771ee0077c461f508886
SHA1d7aa2ea73e7c6a62ee67894148ed640fb2a815cc
SHA2565d924fa4753625f6884395f15b930c21ef2ce1410ff99dc5b61b896a2b6a4b80
SHA5121414a39b00991a3558d301be05dd5557f216928597995d00295144aa15600d1e6c40356aa3323b1279f016efe1e9803fb9be2f00b823d533e2f090f3c7c185db
-
Filesize
6KB
MD58290ed9cc339711ae02f810199cdb8bb
SHA19063d44a822885dd18c997c9865fe2e2cf81795c
SHA25636344da7c9df0bcaf6f8be686c9e44643688fb6436298dca84366e899756fdbb
SHA512b469091a5b165c7ce51238a2ba76dd372e53abc8c402684bebb2cdab35a40cb8eea0aa0981235857ec0e8db402eab0d9bec896e426532de81d479d3266952366
-
Filesize
7KB
MD5f9df68f6ee881e1265901556a909eb65
SHA15215158e31d936a88ad2287dea507790bfe897e1
SHA2565c3359d0dc51acf769a3ff25905d915e704497c65b9edfeb8046072f58668c18
SHA51228a85874df6025bbf98ff977e8fd99bf111656cc452aa72f46714a58767394ff678ce192dbf488476f542a2009a68a77037acfce1a6b7367d3c7aab7caaef488
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD520c61f9e36c4a833825f76ca7015e2f6
SHA11765545b96a4ae7c03a6178b0c50d66308e9f35a
SHA2564793d1750b918293766a1348e2c561d467b22bdfd59a1b25478dd14d88efb811
SHA512b4b883a87a734b601cb31b26dbedb6ce8f5bf00c4b7751f3761b436997e6330ad5d52fafef0d5852cb5e9a221d06c323fd53ea9aa21a3b146fc455cd3c3e364e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe643f0d.TMP
Filesize48B
MD542a7c46bdf5d714da029ccba66578caf
SHA1e3520e77d53a2a14e36fe4d3a02b504c9c661e50
SHA2564a718adba9296831e1ca2db0c7157a5a0bb52702a881612a57965ab46587498a
SHA5124c3acb1283d3eadb89066c23a235a4e1b107fb0f8d26582bf36eff4b45d3f0da4cff65cc9780c0e7d293f087cfcc8810c262885a3ac99ee65ccfc8a23711cd9c
-
Filesize
872B
MD5362ebde36b2c8161a9df4aa8e1cc53c5
SHA14dc0707ec7d9e45bc3d6f29e5a597ec3bc23bbf6
SHA25660dd6ed19163382846a6a1a45f4657b135733b1727f5c5fcc45e56ec9c650892
SHA512759ec175244d69903326bbaf4b71ee83d7626ae50238a9761d068149a46e8b9c891b6e8ab07ab7927b94c35e71754d0680799cd6a644b0f1999fa69b9a8fdbfc
-
Filesize
872B
MD582f68c44fbbbf177dc66f9d97957340f
SHA1586ab06194f3859c710f2298e74cb5e3db0c14f7
SHA2564e7817d22eb085f2d303468627bb229e11352e38f3fc4e73c2bb65755f9afc76
SHA512d139b646b395a06b24111b83e4347ab874a6b665027f78cd2946e911ed486bb593c3733e099e1118996193fc840d4765aeee065a49da2956dbaf69797edbba74
-
Filesize
203B
MD56407cc26dfe8a780ab2e8b5d3dc0cd92
SHA1a0c7cd47a5e286f1131af4825e1373f03e19ac1e
SHA2561a81256f4090ac1c63561499ed1f98a185c1ddf75c9be2576b5a23733b5241e7
SHA51286c7f037d3ff44f561796611c2e88d0e905b33ecbe8a37089f554b89ecff82985d265f6870e7cc74d2c8b26587bf191958c90d5ffa9941c4e3abbdc8cbac6f1d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ee3c9176d8e38fe4d70ad8bd3bb7f8e6
SHA16601db4e5ea0c99e978bdfedceb327bbbc90620b
SHA25651f5097b5cc505ff6ca6e552a242acb3a3988d219456a9076a665a24867bd6a4
SHA512dcef4f50f657548d9d789dbaf2ed8547978d56a06a477e6107ff73ef5745b0284a9369ebe5c2d3effc71b2f6d12b54867fa8d6953b156a4006e6d4af945f2510
-
Filesize
12KB
MD546fa14cf7fd3cf5a37a9a916f312ba62
SHA171b516d20aeadbe66b40d38b4242f44923aeadad
SHA2568a09301d56845b8009a0d1ecf4ca0e60a96f8e62158906b57ae047ae4df31b6b
SHA51285f57be04a235352a94a58cdaf61d4b22f2126f2f7afcaeff84f414a499613f5856845b5b80db984e4e9a54a45e8b2ee0f61832437211df0633005831fb0d908
-
Filesize
12KB
MD511bdae45067db2b19da919ed13aee229
SHA11ccff93441c7d2a15db5367aeda41258ca595699
SHA256b575a2074ef85de2245bc3fb09f6510164221308606d648adea0c216c1cd3d0b
SHA512f6c08d41225f0ff45407eee3c417f46699a72969fb775edcbaf9f84a749f7bf192243e84709b073ad71ba0e48f097cd2610d590c481ef1374fa37449c7c790d6
-
Filesize
12KB
MD565818fa78de81a056f37ec3bceffdd9e
SHA1d9be57ffd2f79cb7a23095135a1bac2eb1aa8a6e
SHA2564430951b1dccddd2bb7b5f04a05adb25e7e0a4e1dc4bf0645e3f8f410831d892
SHA5124a6d027ba7008ed9b1af08768653e528752028374a158a38e7e47fc01fe7624a866f104c90868898fbd1efcd7ab31adb36c9c468b949eb105fb1e0357a82a903
-
Filesize
3.7MB
MD53a2f16a044d8f6d2f9443dff6bd1c7d4
SHA148c6c0450af803b72a0caa7d5e3863c3f0240ef1
SHA25631f7ba37180f820313b2d32e76252344598409cb932109dd84a071cd58b64aa6
SHA51261daee2ce82c3b8e79f7598a79d72e337220ced7607e3ed878a3059ac03257542147dbd377e902cc95f04324e2fb7c5e07d1410f0a1815d5a05c5320e5715ef6