Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
29/07/2024, 20:56
240729-zq79pazejm 1029/07/2024, 20:52
240729-znqa4athrh 1029/07/2024, 20:33
240729-zcc7dsygkm 10Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29/07/2024, 20:52
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
lumma
https://kaminiasbbefow.shop/api
https://horizonvxjis.shop/api
https://effectivedoxzj.shop/api
https://parntorpkxzlp.shop/api
https://stimultaionsppzv.shop/api
https://grassytaisol.shop/api
https://broccoltisop.shop/api
https://shellfyyousdjz.shop/api
https://bravedreacisopm.shop/api
Extracted
lumma
https://horizonvxjis.shop/api
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 984 Main.exe 4996 Main.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 drive.google.com 14 drive.google.com 15 drive.google.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 984 set thread context of 3572 984 Main.exe 131 PID 4996 set thread context of 2948 4996 Main.exe 139 -
Program crash 2 IoCs
pid pid_target Process procid_target 5032 3572 WerFault.exe 131 4700 2948 WerFault.exe 139 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Main.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1908 msedge.exe 1908 msedge.exe 4596 msedge.exe 4596 msedge.exe 4620 identity_helper.exe 4620 identity_helper.exe 4284 msedge.exe 4284 msedge.exe 1384 msedge.exe 1384 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe 2744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 5008 7zG.exe Token: 35 5008 7zG.exe Token: SeSecurityPrivilege 5008 7zG.exe Token: SeSecurityPrivilege 5008 7zG.exe Token: SeRestorePrivilege 560 7zG.exe Token: 35 560 7zG.exe Token: SeSecurityPrivilege 560 7zG.exe Token: SeSecurityPrivilege 560 7zG.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 5008 7zG.exe 560 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe 4596 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 4940 4596 msedge.exe 84 PID 4596 wrote to memory of 4940 4596 msedge.exe 84 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 3068 4596 msedge.exe 86 PID 4596 wrote to memory of 1908 4596 msedge.exe 87 PID 4596 wrote to memory of 1908 4596 msedge.exe 87 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88 PID 4596 wrote to memory of 1640 4596 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1D8OJJsMf-yxG5IUu6O4zl9cp3zNh3c6e/view?usp=drive_link1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff587c46f8,0x7fff587c4708,0x7fff587c47182⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3008 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6516 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,16227787305932066755,10377546205935926436,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4700 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2176
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3452
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Main (1)\" -spe -an -ai#7zMap26899:78:7zEvent306641⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5008
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Main (1) (1)\" -spe -an -ai#7zMap19837:86:7zEvent123961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:560
-
C:\Users\Admin\Downloads\Main (1) (1)\Main\Main.exe"C:\Users\Admin\Downloads\Main (1) (1)\Main\Main.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 12163⤵
- Program crash
PID:5032
-
-
-
C:\Users\Admin\Downloads\Main (1) (1)\Main\Main.exe"C:\Users\Admin\Downloads\Main (1) (1)\Main\Main.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 8523⤵
- Program crash
PID:4700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3572 -ip 35721⤵PID:3500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2948 -ip 29481⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize408B
MD5e3a3dbb3d72cd01cf537f132a824730b
SHA12b053079ac64efc71c02d8df3bb82e125b1d91d7
SHA2565bc55b745e1c44e825a92568b80d4136e6df686d3bfe2f3029e17c89cbc8bdcd
SHA5127418e3467d35aecb46f8c88b1a0205c44f13ea101958ae04dc1dd35d34f06197c8cddd9d55e9c60f99748041210a18a8a9b88567129c11d15977177a38b23372
-
Filesize
3KB
MD5071db5f797021fbc93ebf7000b57e152
SHA17597c8e8375a7898435faab8a8f5c76950b656d1
SHA2562a9517048f5c6bc93f9970ac4ae88e8f7cd5e6e8f4d2b9af0eaa94a83c897bba
SHA512fedc8a5d71933570637246cfa41ee94ae3b38a0005dcea9ccdfea7a1114efd3a7958fbf23d16018c326752434c58dcced781bb4fd96c4050aaf46fbcaf4ee943
-
Filesize
3KB
MD57465ba5bdbcfc33e058d77a1c2d9a62a
SHA152f321d3c5e5a0d4e49eab30bdabd3e712155843
SHA256d86df782a582635a72a6beab786629e2a4b28922bf9c9d5fe1a713ea293b6540
SHA51271447d12026d22f9ee577d8bdf20396a194c534d3b0f04590c9211d0e313949b40e48f82b0bf9ac4bdac1ff2755f63e7bfd0d4df63a30436971c4501da813b61
-
Filesize
6KB
MD58f564d73ff272279c952fdcf35b02ee8
SHA13be410b4079e9fed6b868861b6b06ac123d1139e
SHA25619bb1aaa8986acb0d1a38d2517d12e96253d58313d9c72eb6bfb063efeb6ca0b
SHA512d0323d9427ba43307ce21f660c1e0a93dfb4f0b4a24a78204a0bf7aa61ced7287241558c8338db9b8da380c28f411a8d5a18103e98748667c21b0e42e95b1318
-
Filesize
5KB
MD5a2a271e09c8720c5b83e91abe5bbb608
SHA1a1da8583190d62a6fc951ccfda91974525247c60
SHA25621bf3a16606963ccbba2e76d389e77122c617036399f8289d14ade84a9c4bad8
SHA512c018211bfe2111beed7bbd9917f912ad1b7989b7170f031ab28fd889adb0103d63d62245b94475fdddecc18cbee52cb37ce980e5996eff00d90081dcf03eaac7
-
Filesize
6KB
MD57e8a777afe9f433c2d26edc5bf77818e
SHA17b0780de50a0b6bf51c700510fc7ac935c095042
SHA2567d5f392487233a00b58014a10133df356a7810367507a2f11771849ccb80cbc3
SHA5123db833af3de016d3afc591f8bd6222323277822a40de300b4800e83238805e4d8beba80df57af7f3fc6f43e43d9b66bdc2c83dd00e83d1def12b7bc83b4dfd62
-
Filesize
7KB
MD5fbf8c7fdc10ce15235dbdaa589a4957b
SHA1670f50da9579c6ef9939b0b2bed104f3b125e394
SHA2560933ab6590461485420b8340611cabc8865e4eb7567ae8eed1cbe786957a0788
SHA512c6614f48a0878779c94b97a60ccce6086a310b4390140371b98ba06e3eea0ec816e3e24c5e428b890bfc90733f6728dc7d5e06122fbc712ddcb22cd1df196f82
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD531f8c4b68f536ed11d63020320897144
SHA1e2390c3554272476141d49945ca5e85a9b07f9a2
SHA2563bd0bd71e3e8c393a48fb9ab6692de05b2539b76ef45ff9c8599af04ca3f02db
SHA51204d1f95fe1eec7ec8c07be338c1e92592d571e4b34b5a50f72d5d111b9c9553e1527a673ab6f84caedc9d8d7c98a661437d530ffe2246b27dc46e34ea395ac55
-
Filesize
11KB
MD500e8d8d3e13d4c0fd249c76f3cad707d
SHA16fc10a1cdc97ccd6d21043aeccadc73a78e66bf2
SHA2566bba60cc367df3afaebacc892899c28e01ee2281d62706083c952771dc9dd4b4
SHA5128d8e5614238265457402078a8bde179250e71de8872b3249ccd9ed273ee9aa72500d1d54257dd8aaad32262c956c5b1479b1cb68f5e6dfc85f023284a759db8a
-
Filesize
12KB
MD59d17a5ed9b24486f9861d3761c789f40
SHA18c9b31e18148d98b587c2a66f6a84799532962e6
SHA256b304c4bd92bbe0a531eda17dd2ecd366b9d426175f0f75675228fc81fcc562d9
SHA512bd40a009a8210d115c9dcde0d26e8b09046e76ee98bde81d53008198a4157e9caedf14fd86266bdec13cbf18ab86f716f155b093ab65af26f8d07966825b48cc
-
Filesize
521KB
MD598455c0df4aae673a4715d71afad2c5f
SHA1da48917d453ca73fbaeea46e7e857af0b9402112
SHA256c16f0c5883cf636187f80467435851e2f966e47d9797e6a7b0be44d61018f5bc
SHA51211bd87ea1606f7592f09b07aea73485624a4590f209e64514643680bc2775f0d1a5ff1bb1d492476d654c27994ee38c083f83322d27dc69fdd7d1082468830b4
-
Filesize
419KB
MD511e40cd744c1b342988a44c3632b360d
SHA16377ebcf8b46eb0bef07321c4ebebb29f1b13565
SHA256f00c12f1feff9ffc6822df557ddfdcef9202e9262169cd3073a64560159efcc6
SHA51259ad5d806273828c7e5aca95d3fe9181128c8f92e7da561f663718002a4067e5ce061b18a3993ef7931fcb0289d1361c9000cb4175d600f138de4d6ebda05392