Analysis
-
max time kernel
29s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 10:49
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/CoronaVirus.exe
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/CoronaVirus.exe
Malware Config
Signatures
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Downloads MZ/PE file
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CoronaVirus.exe CoronaVirus.exe -
Executes dropped EXE 1 IoCs
pid Process 4000 CoronaVirus.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CoronaVirus.exe = "C:\\Windows\\System32\\CoronaVirus.exe" CoronaVirus.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini CoronaVirus.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini CoronaVirus.exe File opened for modification C:\Program Files\desktop.ini CoronaVirus.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 50 raw.githubusercontent.com 51 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\CoronaVirus.exe CoronaVirus.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\VSTOInstallerUI.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\fr-FR\msdasqlr.dll.mui CoronaVirus.exe File created C:\Program Files\Java\jdk-1.8\include\classfile_constants.h.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.Win32.Primitives.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.VisualBasic.Core.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Formats.Asn1.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\kor-kor.xml CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Memory.dll CoronaVirus.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\colorimaging.md.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.Compression.FileSystem.dll CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebProxy.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Serialization.Xml.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-localization-l1-2-0.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\History.txt.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\7-Zip\Lang\ga.txt.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscorrc.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.ComponentModel.EventBasedAsync.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.WebHeaderCollection.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Principal.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt CoronaVirus.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\msader15.dll.mui CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.Linq.dll CoronaVirus.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\javafx\gstreamer.md.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Diagnostics.Tools.dll CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll CoronaVirus.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.fi-fi.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-string-l1-1-0.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.CSharp.dll CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngcc.md.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\jpeg.md CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\fi.txt.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-runtime-l1-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-convert-l1-1-0.dll CoronaVirus.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\cldr.md.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Linq.Parallel.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\Java\jdk-1.8\legal\javafx\directshow.md.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\jdk\xmlresolver.md CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.dll CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvSubsystemController.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\mscordaccore_amd64_amd64_6.0.2724.6912.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Linq.Queryable.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Numerics.Vectors.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\en-US\oledb32r.dll.mui CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\win32\jawt_md.h CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-fibers-l1-1-0.dll CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Linq.Parallel.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.id-id.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sv-se.dll CoronaVirus.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\pkeyconfig-office.xrm-ms.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\msquic.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.TypeConverter.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe CoronaVirus.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\Microsoft.WindowsDesktop.App.runtimeconfig.json CoronaVirus.exe File created C:\Program Files\dotnet\host\fxr\8.0.2\hostfxr.dll.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\lib\deploy\ffjcext.zip.id-A0188EF0.[[email protected]].ncov CoronaVirus.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CoronaVirus.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 132881.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4196 msedge.exe 4196 msedge.exe 2700 msedge.exe 2700 msedge.exe 3492 identity_helper.exe 3492 identity_helper.exe 5112 msedge.exe 5112 msedge.exe 4000 CoronaVirus.exe 4000 CoronaVirus.exe 4000 CoronaVirus.exe 4000 CoronaVirus.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe 2700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2700 wrote to memory of 4852 2700 msedge.exe 83 PID 2700 wrote to memory of 4852 2700 msedge.exe 83 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4724 2700 msedge.exe 84 PID 2700 wrote to memory of 4196 2700 msedge.exe 85 PID 2700 wrote to memory of 4196 2700 msedge.exe 85 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86 PID 2700 wrote to memory of 1152 2700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Ransomware/CoronaVirus.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf28c46f8,0x7ffaf28c4708,0x7ffaf28c47182⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3432 /prefetch:82⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6516 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2004,10732141306632214001,14080382213317982349,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6128 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4000 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:3568
-
C:\Windows\system32\mode.commode con cp select=12514⤵PID:7368
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1604
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3000
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"1⤵PID:21964
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"1⤵PID:21972
-
C:\Users\Admin\Downloads\CoronaVirus.exe"C:\Users\Admin\Downloads\CoronaVirus.exe"1⤵PID:39912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id-A0188EF0.[[email protected]].ncov
Filesize2.7MB
MD5653000ccd084f4408feb902d34745610
SHA1a1729ac4a78c159a2881fad75fc298c7a32756ef
SHA256e45e0c9d7eaa01ad40a7fdb4f9a1328d60cb090b339e1c60a959fa79d4234fe1
SHA512e773dd8fb2be145ad94ac541573913ee10b4ec6365b488a557c4f80d60b9bbfc7032ea632bb5a397d8889657e794420672b720c9d46ad10d010050bdb99f7c79
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD58a2b0b75f0ef8202584b73480c16c379
SHA14fb6032f6b9e14f91588d7a9ea1c559a1bddd455
SHA25623bb2ef7461e20c31d7481757b120af0d40c9bb6dba966aac5e247f7c5d4acc7
SHA512c821e68d7027510dbe51c33b252a9aa1d0f8f05dece8e2015efea3c8eb9217ffcbbdca72e53f4f18bfeba39f4eef24343504987d9134124b44a4b36c6500fa41
-
Filesize
579B
MD50a8a7c3dafeb4ad3d8cb846fc95b8f1c
SHA169e2b994e6882e1e783410dae53181984050fa13
SHA256a88495f2c1c26c6c1d5690a29289467c8bb8a94bf6f4801d2c14da1456773f90
SHA5122e59b4cd4cf6f86537aae4ae88e56e21abcff5070c5c1d1d2105a8e863523c80740438cc36b2b57672bc7bb7fb9387896135afcce534edfd4697fecf61031a5c
-
Filesize
6KB
MD5985ba0d2287907e644c59fccf6610cf4
SHA1d1bf3ed0aedb81240d530032d680d79989547d40
SHA256008abb5722e784f97b2ac2154833697c4c2047a35f67a39a6bb708cc551ff771
SHA5129f43df0ec56b34626958f668f8fc93f1a0f751a90da96cbe7eefb9e27435fe22b3b3f2dea40c589610f15f8f1d3b129236ad1dfb750132f45ceda1c6ef548d80
-
Filesize
6KB
MD571a44dcbf7309788eced51100a37c011
SHA1a3ccbd0562afe58c2e97439fcd9bd925081315db
SHA256b6ce7171356525d73d0a7962392c337af5e5ede504e21f46cb65024702b44b07
SHA51224652e9c6f37bd520410381359a5db704f3930522db1211570155fb294f466a4c91fd491a89269f6cba79d35046ff1e4398f7443ea0ffcf9ac2bea5d61c413ec
-
Filesize
6KB
MD5b54cbcb4c6b7e1c8001540da007f32c1
SHA174a5a9e63eb101b2af66ef7758321279799fa327
SHA2567143baabaa5edf30b02d435c3bb4728a50ed3bc60d32424971bcfcf18a5823c6
SHA512301861c175c54ef9d852f7a3e321a7e70d62c6c90eea266bc1e886c5fd75c0db85c99bd0ee83b7a30c289e1aca71c2c9d6019da20027d35dbe92ebc7936cb363
-
Filesize
6KB
MD5d9cb57bc521f1693b58bb59c4dda4fb2
SHA1fa308a1861b58dd94b1c41d40fe199aa759055d9
SHA2561dadab33370072e3aaecc160c7bd0ba1208bb322e7c05b65bbe5b88efbb3f147
SHA5127ea54c0f470282b7b8502bdece789e0b9650134d45d841b6433ae215413318292ea439672821a2bc8844c8b9b8cd2899b975ed69309a5ead091f8eaee0300734
-
Filesize
1KB
MD535a47bbce7b80d193244b38e98d555d3
SHA1a3917aa20ae254d6335fae83fa023d82e034f670
SHA2563d4bf7af1ed38f53105ea9d7e367a65cb07a128aa3d5c9f2a89949ddfef9b16e
SHA512c11b2936feb011df3dc7d95c576e6136c04f9a49c4d76c5b72d16103cde40d5ce35fd713eec8507524084f82e757da7f4d7dc8843464e51bb6fa7e042dbe2852
-
Filesize
1KB
MD527e8332326312f69ac4f3247b6edfce0
SHA1a3afb7fde97bef72c863f19e0d77189b03698bf5
SHA256628f1ab207f688609a1405ea9847bfbae36f4bf9483122c18a4278730df4efd4
SHA51249b21447e9731e9f5bc00578fd28553ffbed9f6663fec6122599447ad1f92b086bd897427836e0c6396064a36bed960307f27f5d4cda1cf0628cb065cf1555ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5451523202da170fae9e84ce17995ed94
SHA11d90d213a71733ba24fefd41157d1afe7ef734b5
SHA256825459f91a5b17e3b3f7f1533001530ee2abf73175f3efb116785fd49d387601
SHA512dce73ecfab066a0885c93c081da052e2716882dcdc8f4f99f9a9b11147af95331d8e729803d1126219771d9b75130b1ec59896deceec3a2dcb38c13b7d15073d
-
Filesize
11KB
MD577426544d25ad33063dd84a644ab4571
SHA11f43486091dee6fadd4bef14429013177630dc55
SHA2564431d026b24fdf44b13598ba518c64c2bdc08a469e6666338a687894bb7169a0
SHA5123d67c803a68f1947db6b8f4eb76d81df482d6a6af2b431e7a53204743eeb7fc091961195700ab7315458347ef01412084d4a7e3d02fd9b96a88d27ba8bd09815
-
Filesize
11KB
MD5960b07b2b2bf6d0fd4098ba0aac94a2c
SHA1b0f7edce83b232dd9079e1aeca4bc8618f3a5ba3
SHA25696a81311765c407eb50f9d3d0792fd9e2c3c24d65af391f16b279d72c36c72f8
SHA512dca4e7410045b8a4ed5e8f8c1661b56a431d75f1e205df6799e0c6dbe00c9c9fe87e7e89c311de5a8c19b53c39a0a97971bbb7c3c9de000705ce89e7564ac927
-
Filesize
1.0MB
MD5055d1462f66a350d9886542d4d79bc2b
SHA1f1086d2f667d807dbb1aa362a7a809ea119f2565
SHA256dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0
SHA5122c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1