Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe
Resource
win10v2004-20240709-en
General
-
Target
7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe
-
Size
863KB
-
MD5
b990ac5e7f65fee5ebd30c139af4ba57
-
SHA1
bee1ba9292111dbb3666baee872810c3993073f3
-
SHA256
7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c
-
SHA512
fb2c1dfa0ca4e94136cbff16e5029e1958cae0a92c270b53ea17ac77609d7e905bae2c81449d711c78c401f3710951e2bebe55c07dcd0e6ab61db65605212b9e
-
SSDEEP
12288:+6DKcrMRVxFVaHw4bPOXbHrjJgYtbHtyKzpw1VEWZJ2MlyXDKj26V3TsRsreHdvQ:E9FVwwo0HjJBZeVZ22j26hrMdo
Malware Config
Extracted
remcos
RemoteHost
192.3.64.149:2888
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-7Q1GRN
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1784 set thread context of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 4240 set thread context of 1424 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 4404 msedge.exe 4404 msedge.exe 3060 msedge.exe 3060 msedge.exe 3052 identity_helper.exe 3052 identity_helper.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1784 wrote to memory of 4172 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 94 PID 1784 wrote to memory of 4172 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 94 PID 1784 wrote to memory of 4172 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 94 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 1784 wrote to memory of 4240 1784 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 95 PID 4240 wrote to memory of 1424 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 96 PID 4240 wrote to memory of 1424 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 96 PID 4240 wrote to memory of 1424 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 96 PID 4240 wrote to memory of 1424 4240 7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe 96 PID 1424 wrote to memory of 3060 1424 iexplore.exe 97 PID 1424 wrote to memory of 3060 1424 iexplore.exe 97 PID 3060 wrote to memory of 2932 3060 msedge.exe 98 PID 3060 wrote to memory of 2932 3060 msedge.exe 98 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 2468 3060 msedge.exe 99 PID 3060 wrote to memory of 4404 3060 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe"C:\Users\Admin\AppData\Local\Temp\7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe"C:\Users\Admin\AppData\Local\Temp\7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe"2⤵PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe"C:\Users\Admin\AppData\Local\Temp\7e329b19cf17a8cba1c7102ed3758a5f50ffc7a95af0a1cf82e3244fa68efb3c.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\program files (x86)\internet explorer\iexplore.exe"c:\program files (x86)\internet explorer\iexplore.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.04⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd149946f8,0x7ffd14994708,0x7ffd149947185⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:25⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:85⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:15⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:15⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:15⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:85⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:15⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:15⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:15⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:15⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=124 /prefetch:15⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:15⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18405159938480015871,4640799022358148653,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=iexplore.exe&platform=0009&osver=7&isServer=0&shimver=4.0.30319.04⤵PID:4664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd149946f8,0x7ffd14994708,0x7ffd149947185⤵PID:3748
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD59a5b2fc3edc5af5cddae46e94b2a18a8
SHA1b5ae2d75de4972a5f3ebf2bc06328f27ef39ed86
SHA2565138f70cfc9a6a71b3ed1484d8656c72f1b0164ddc6452366b4453c0740a9a36
SHA512e3a727c050dd834f5538603712030e7c51b758c76ac15e8af531342f656029a78b653f7da5c0caaff5f6b91f2ed6b009faeeaea76071b766b1613d23d520c8e7
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
6KB
MD54888d4956e0f2ff01571aa73d0a215be
SHA1faa5a19513a0f8eccb654eca214541590b572871
SHA2562ada7a860572df62017afa4eec6c1c43d1801df51435590782ac759bff98f9b1
SHA5123e20915283a9f58cd8a6eb90821bef3e502da8adfa144ef5a2d0744ae2b1dfc5ee6f287dfe5fe0f17ac6e77d4c622747346ae6d044529da7f17a634ebd4b2d33
-
Filesize
5KB
MD5ee5fac48eceae7f1352506e1ee56d4f0
SHA179c34301d0355a13caffd888681a0cd5f5e42887
SHA25639863e13a432b40c4f0ad4085b15a3edbe0ec0eec7065751df20f884ed6a860c
SHA512173daf2dab6bc5ab888e76ce21cb36753a1b16e4c1f2428f0a43ca32b109265151cd011514ef843bd11417c0ef50883e59e523f302040420a54e29873072d0cf
-
Filesize
6KB
MD5d6b3b2046b50eeba928a956621fd145f
SHA115c76c66046b87af8a7c2cd374bb20cdb4bec492
SHA256f033bb6e4d1c910e6fe375ab0aafc6e76e56f2a154b8aa5f1830a3d4755a3e02
SHA512daf04214e38191dc90db4bdcdbcaa2d363631b9ab7480db85a8ba09beffd4273bdebebcd71776b21d1c7d8db0d0605b7f054f7b96bfd34bb98b459a29c5097d8
-
Filesize
371B
MD5faf6378c61c8799afdef602e73d37084
SHA1655cdbb29495709db54847eb5971173129788503
SHA25679191c3c74b97d5bb71a62f8ff9857c581070213ad5d1b2e538e24a8ef66b32d
SHA5120e4d69ad25ebe2c9a2d7469d5c89bc839808004241e5e767c2d2d7ec91090f7d321b627d345c8ea1cce3715c894861913f85606195e0f4cae4e49c1299be539c
-
Filesize
369B
MD567966019e81f4ff42efb7c865b079f42
SHA1680d200409449505f4a043c124d27f443904c6f7
SHA256f39362e00528c0c036fe0d37eb44ea6b50e810dcccbdf8d341e349fd27ef0912
SHA5129d1192161d62967ad788fec046489cfdb6c30f277e369f4d216c61df826d7585ff653f713a01d27e217f919a09fed422fcba4ee3a075364dd2c8732855826fdc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58ce6ea77c0e1763bc1612191d84400d9
SHA18b8878f60f6afa9c671b51be119323eafb026247
SHA256b35f47409e1f2fe59ea163905eed110ee9bdfd74fc9a509f47f5c5f381df79f3
SHA512371f1be81aad64c93b4b817809d28bbda1b0beaf3f95003aada3e16460ea66fd84c5e977effd08a442fa69bdff7696dd0a373d9ee8932cd5d37363fb79eab09f