Analysis
-
max time kernel
481s -
max time network
593s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-08-2024 04:53
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/DDro86
Resource
win11-20240802-en
General
-
Target
https://gofile.io/d/DDro86
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar:Zone.Identifier msedge.exe -
Suspicious behavior: AddClipboardFormatListener 6 IoCs
pid Process 1472 Winword.exe 1472 Winword.exe 4364 Winword.exe 4364 Winword.exe 6108 Winword.exe 6108 Winword.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2576 msedge.exe 2576 msedge.exe 1360 msedge.exe 1360 msedge.exe 4384 identity_helper.exe 4384 identity_helper.exe 5100 msedge.exe 5100 msedge.exe 4184 msedge.exe 4184 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5116 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe 1360 msedge.exe -
Suspicious use of SetWindowsHookEx 41 IoCs
pid Process 3312 OpenWith.exe 1336 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 5116 OpenWith.exe 1472 Winword.exe 1472 Winword.exe 1472 Winword.exe 1472 Winword.exe 1472 Winword.exe 1472 Winword.exe 4364 Winword.exe 4364 Winword.exe 4364 Winword.exe 4364 Winword.exe 4364 Winword.exe 4364 Winword.exe 4364 Winword.exe 4604 MiniSearchHost.exe 6108 Winword.exe 6108 Winword.exe 6108 Winword.exe 6108 Winword.exe 6108 Winword.exe 6108 Winword.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1360 wrote to memory of 3976 1360 msedge.exe 81 PID 1360 wrote to memory of 3976 1360 msedge.exe 81 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 4144 1360 msedge.exe 82 PID 1360 wrote to memory of 2576 1360 msedge.exe 83 PID 1360 wrote to memory of 2576 1360 msedge.exe 83 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84 PID 1360 wrote to memory of 396 1360 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/DDro861⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff7c903cb8,0x7fff7c903cc8,0x7fff7c903cd82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:2300
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4364
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵PID:2504
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵PID:2780
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵PID:2464
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵PID:2788
-
-
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13048644260204825475,16263351775833845400,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5960 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3312
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1336
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:5116 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\LLOVIO+EXECUTOR.rar"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1472
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4604
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:5276
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:5508
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:5544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59828ffacf3deee7f4c1300366ec22fab
SHA19aff54b57502b0fc2be1b0b4b3380256fb785602
SHA256a3d21f0fb6563a5c9d0f7a6e9c125ec3faaa86ff43f37cb85a8778abc87950f7
SHA5122e73ea4d2fcd7c8d52487816110f5f4a808ed636ae87dd119702d1cd1ae315cbb25c8094a9dddf18f07472b4deaed3e7e26c9b499334b26bdb70d4fa7f84168d
-
Filesize
152B
MD56fdbe80e9fe20761b59e8f32398f4b14
SHA1049b1f0c6fc4e93a4ba6b3c992f1d6cecf3ada1f
SHA256b7f0d9ece2307bdc4f05a2d814c947451b007067ff8af977f77f06c3d5706942
SHA512cf25c7fd0d6eccc46e7b58949c16d17ebeefb7edd6c76aa62f7ab5da52d1c6fc88bde620be40396d336789bd0d62b2162209a947d7ab69389e8c03682e880234
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD524d0f93e0b08b7fb26d3439a53583bf1
SHA17bc6dfb018a57c4e825bdcb755c6ab013f98c111
SHA256c6ef9ea514184d1ab7ad725f3b34578d85e00061ad9c0a9b943eaed18406004d
SHA512cfb0d6d72d6992200ad02c87cf4dc0adc291618f5650cd6225929a303bbef605c72be2913cdf42ddd626e78b3916cac41dbd8e46b3247129cd68ec1ae1d4205d
-
Filesize
391B
MD55f05b26e0caccbee54089cb0044220cc
SHA1e76ead734684a93a820d05c76824d5445f28f584
SHA256256bcc760870f0a18774ed0999652be257776a2049eba989bda8f359b1507dcc
SHA51229ecfa0586aaf62f2e6a90d2623fb01c7bb156993f2ed00085d8dcc97026b48aad69f27855cf3231d6f3d5c388a81367ec9e27ea47cefd50c530d08862292dd7
-
Filesize
5KB
MD5e55b2399ed7970db767a8e05c0d62da6
SHA103de27eccc7b543654b973f56726acc5033b5c09
SHA25611c5fdbecb754f5b90c12c9ebc941354e7d007527283afe6fc649315777143d9
SHA51249be42e00d2b6e88eae553e03e0708e35498150cb974bb2081fba049750952b9c58232145d851f88609c417cd9cb4264f9ce622f7b8815de891d453cede1cf15
-
Filesize
6KB
MD5aa6a21e2532b5e39684b852fbab4e9f1
SHA14dc05ef365cfe2d1c038dec3df8e4c4d01d20828
SHA256030c3b519878fdb1a6887b6e8e9d3d179128559db84992937118b91480bcdcad
SHA5123034fca84abe02dad2dc341364da466fc5f3a10d8191a346a625c02b5010d953b76d74ae2d90723dbcc0a6b34fbf6dbee876dff1169b3db337d167b6cc447345
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5ae123cebe35862ce90d5b041b5fd3238
SHA1276b799198b4dba933585becc547626c614b6af6
SHA25622e01239c45db02e60f7f08431988b09532660ccfeccf5ef7a405b69c07ac09f
SHA5122196980786887074cde3d892a0364b0e64cfc2cc4bd60beefbec6b612b9449e6ab69104105e31caa386918734f7cdc6ddbcd7211bde2e3897b96b7ead17193cd
-
Filesize
11KB
MD52dc413acf2ca3732d8ab789b800b5c4b
SHA1c763642f61dde2d79d2351a2fae94af640da5a58
SHA256f86d29eeebbee26c1cc6d99fad239f19a70bd496de47835aa98f88dc1d401f6f
SHA512eeab5af4991dbf22fa79cb8e5503ed9121709686417cf7fd41128f0955e6777068d71c442ac4b548de002de2e2dd18d1cec095f35bcd151ef8e663640079c2ba
-
Filesize
21B
MD5f1b59332b953b3c99b3c95a44249c0d2
SHA11b16a2ca32bf8481e18ff8b7365229b598908991
SHA256138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c
SHA5123c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4
-
Filesize
417B
MD5c56ff60fbd601e84edd5a0ff1010d584
SHA1342abb130dabeacde1d8ced806d67a3aef00a749
SHA256200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c
SHA512acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e
-
Filesize
87B
MD5e4e83f8123e9740b8aa3c3dfa77c1c04
SHA15281eae96efde7b0e16a1d977f005f0d3bd7aad0
SHA2566034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31
SHA512bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9
-
Filesize
14B
MD56ca4960355e4951c72aa5f6364e459d5
SHA12fd90b4ec32804dff7a41b6e63c8b0a40b592113
SHA25688301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3
SHA5128544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\C4098F2A-5035-46E8-951B-232FC1B72506
Filesize169KB
MD582d5a0e3b804e5b94feb6a9ec24995af
SHA13f5b9f270626654a60cae22d1d58a21ae1aab4c3
SHA2564d23cbab0ac86740d1393b91b68de17b6d37326e8581e2c78afda22800de2c4a
SHA512e2dcb714794badc2e9ba655f1556206e21d84026f155ae7e03967517c98c7ae846317c5eb0a0a8ea0fd18c85b1cc13ea4b372ab9bd98f0c0aa804ba23271ddfa
-
Filesize
331KB
MD5299790eb4da891c0cad926473bdea5f7
SHA1dacbd07b42d91a20ba9bfcdee5cdd75ce15644da
SHA2566fac6770bea97503592e79ac1d458450afd373eb2fa1accf4218d5ee447d52d9
SHA5123ab4b0d6b5c1eecc6b3fb37ffdf061713906c92b6c2e15f7f869f7b6a8b45a6dd069743080f3fe57f9726770f49a8826b07f50987fa148b882593481bb3670be
-
Filesize
24KB
MD58665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da
-
Filesize
24KB
MD5085ebd119f5fc6b8f63720fac1166ff5
SHA1af066018aadec31b8e70a124a158736aca897306
SHA256b8411fe8ec499074fca9047f6983d920279e84ddf3b02b2dd5c08cf07ec44687
SHA512adb0522830db26123347cb485c43b156f5c888510e52091ba0fafc22b650ad29630c027746c920321905c28259dce7ff63dded93a79efddd5567c68312117875
-
Filesize
75KB
MD53a895d07aef9b82c5489200a238d671f
SHA12c5ffce8651675172d7717ca6ba568c67bed8d33
SHA256540b521866b3cbc424423edcfcd3916ff0d7390d70378ba59b54901d19ffe604
SHA5122e84461620ac606f4041215837ce161bd9efd93aa8fb19fc6baa8a9bfa61ee229b48762084976dc09d2e8b4ee47ac85d78e140b2c8a5be6b9bf8a60ead919202
-
Filesize
164B
MD5b73ca87f84fc17d7d51155b50bf7538d
SHA1c8d3466f788da7e1cce4e5393ded578d9f4aa68a
SHA2567d7974cbd8d9058bdcc266398319c6bd4cd13582ec4b88d5c37d74e5d9dd5dcd
SHA512699730b937d0f97a232cbc584fee3a04afa7d3058f04a237a3560197e8b730d2279d79ceeed72f8d4d307cb414a3650ba981e2a55e2912b1a633aa574a55e2fd