Resubmissions
05-08-2024 17:14
240805-vrzlqawfqe 805-08-2024 17:12
240805-vq6zeawfpd 105-08-2024 17:11
240805-vqak7ssfjr 1005-08-2024 17:08
240805-vnj2vswfjf 705-08-2024 17:04
240805-vlqrmasenp 1005-08-2024 17:01
240805-vj1ttawelb 6Analysis
-
max time kernel
59s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
sample
Resource
win10v2004-20240802-en
Errors
General
-
Target
sample
-
Size
7KB
-
MD5
4b320922990cfb723b67147a7a97d345
-
SHA1
5d134dcee4aaeadbea36761640434a45c708b081
-
SHA256
70b68ac1477e49a4342383c6eff1056f6a18ff0727aa20630e9e7bc8701011f1
-
SHA512
b21548566a22c31ca19de100264d1c2cefe0c8d8a0361f325194e6514453813376da301b4bb71c9ac0e4c3c1c84589276af79e7f48dd4e6d8ae553590ac823d3
-
SSDEEP
96:SDQ1jWHRUV/okJOlIDNSW0S9I3gtYEMLX+jZEBZu:oQHokYlIVYFSjZmu
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 122 raw.githubusercontent.com 123 raw.githubusercontent.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "182" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 3800 msedge.exe 3800 msedge.exe 960 identity_helper.exe 960 identity_helper.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe 3800 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5184 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3800 wrote to memory of 3164 3800 msedge.exe 90 PID 3800 wrote to memory of 3164 3800 msedge.exe 90 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4288 3800 msedge.exe 91 PID 3800 wrote to memory of 4328 3800 msedge.exe 92 PID 3800 wrote to memory of 4328 3800 msedge.exe 92 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93 PID 3800 wrote to memory of 2292 3800 msedge.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sample1⤵PID:3108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8116c46f8,0x7ff8116c4708,0x7ff8116c47182⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5864 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2032,15187603703525341988,12092052584270544957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3268
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.zip\NoEscape.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_NoEscape.zip\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2788
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3970055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5184
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5f1df3e214822f061b1e8c776c8b31c36
SHA1e2161165b33a98e3377d4779c7e167473b911e5c
SHA256e6dc03935098823421fe656fd03bb6e582e837dec5b1dab4d5366fc50767b8e8
SHA512c629a2b0d095ec267fe0533489c0c69730061044776e6e979abc9cfdd8761c6db5f14f36fa2ca807ff4e29ebbb10601261b83c767a4598b9a62f19db802102a1
-
Filesize
6KB
MD59fb61cc84fd936b1706f8aa939aee6d5
SHA196e778f9cf62876bc19204d7436f0389b5b63658
SHA2563debe5cd5c632a5c3f8edad00bb5d2540c2c8e2401aa98dc969723b1ee8471e7
SHA5124f21f01d8ceaf9ef28465e3ad1e81ce23ef76f1bd53c0aa68a30ccc85c17b2a5dfca3c59ed551e5fa1dc4b8bbb2f6fb1a3f70c7399baac2e9f547c46c71366fd
-
Filesize
6KB
MD55898ecd12d4e77695660729651b07005
SHA12cbc43f86a960d5c149210af88e74462255652d0
SHA25652389cea41db6b355dbaf3b6103406432bfafe9271ee49c7718cf36359b89375
SHA512e629799440c61931a65d420378c9bbbf421525ac0d9a32b85ae72d87c343f135e4b6fa5664d775ca5ab20d842324093d880bc108d8fcf507cc46aefd2d497278
-
Filesize
7KB
MD52fa362366e8aa23f1c7b5cb82888f3f3
SHA164f7021cc6fffb50ddf3234d11db3f6d1b2a10ac
SHA256ab9f8d34c1ff40faff463759a3dd7f8cc348ad90d9d4ffb0ce7b516357fdf0ae
SHA5124bd299484ea308e1231d164cf010bb512da43a138ea9b4781741fb1d39c28f24e4ed240c3fb7e992a8b5f5b49d9e7f92271fcd0a045299b5313ea3e6e3846cd2
-
Filesize
7KB
MD51a5463836f71719de06471bbadb72bd0
SHA167417dc73d037ace0830037f317fc7da8658225a
SHA256979ea69d03ed5a55ba2789666b285510b2defdf8d8506d96bbfe72957eb28071
SHA5128e83bd10599a4e9231f67306a731897be7a4ec90ce130f1548aaa70436c5c9b5170d21a9e3b582c5455ca6c77eacf0b841637d4589492f32497d97f8218105e6
-
Filesize
1KB
MD5444c6763ffd56d90192d7baef4958b91
SHA18ef94c5971faf8f35f054c5edeaf8f1ecf5d024f
SHA256980a786afa2df5e5c0fd168508149d7bb4ff909da0cc34b1971f282052228e58
SHA51251fd6415fed89dabb3ba034102b4b31ed6a285cd5e8983977d9d7eb6277cc16c7efb837f9cd65659565f0d385507d5f7f608daa5f41a0855043e25234c8d6d3d
-
Filesize
1KB
MD50656ef5439e8d095e577733c536beb42
SHA10ff866529d125a874edff449e737f47cd087caee
SHA256364cc7a1321a8a06240d3eebfa600147fd30bde1f11078674bc7c6235d513b58
SHA51299dcd7aacb3f32914209fa13d5448c1f601482b5347429a293491825016da2ac3b7bb2e2e1bd51515a9a0617b4465108fffcc4a3bfc0e0a350aca83a173c4800
-
Filesize
1KB
MD56f751d54b61ab40280ee0beeb9330bc6
SHA1f16f96e89ed3c5e571be6acf3f46a440243bad8a
SHA256779b47a50c9117170a4097ad9a6b75ca062c78c8eb6e26bf5cec1f697d3d98ea
SHA5125ac58ccc80b60c48f9e7034237f2f8346e4a5dd4db7f3bdd07e78bf37fa6bba6543433ea0465c662ac397b8ee5e6df3553090f343de4198ae677291cda15ebdd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d94fd53136140b22d2b069122f5dd445
SHA1012ccce18582ed12833c90a64c196653e4c4fd12
SHA256fd73273d821c0b5c00d839a7c3cdd78385a8b0736007faf69b46ad02ca3bf022
SHA5127a70cff49c5c4254d829b60bb983242eb3b772da57377ceb700a37148518453db49013237f12cd8a29d41c0888498d365c9689995141a297814733a43ec3c552
-
Filesize
11KB
MD56e9b4949b0ad6ff08a9c1e75d384976c
SHA10bc9ca1773db6e61aea47c7b3c627846118abe45
SHA25640cb8145f826f99e5ab2326cd3191b21fea2b7e0e285932909c1fe948aef45d3
SHA5127d7f7ca1adc1d640b049a5b8bfa01c908b93bd973b64c577be92b1db2722672d5612675c7386a8ca3ccdab6605285fa35ec8fddf40f5a60e121de0da4999acb1
-
Filesize
616KB
MD5ef4fdf65fc90bfda8d1d2ae6d20aff60
SHA19431227836440c78f12bfb2cb3247d59f4d4640b
SHA25647f6d3a11ffd015413ffb96432ec1f980fba5dd084990dd61a00342c5f6da7f8
SHA5126f560fa6dc34bfe508f03dabbc395d46a7b5ba9d398e03d27dbacce7451a3494fbf48ccb1234d40746ac7fe960a265776cb6474cf513adb8ccef36206a20cbe9
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4