Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2024 00:09
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1GD6awR0q_3xM6wZDtFIsuwgN-1CLrlLI/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1GD6awR0q_3xM6wZDtFIsuwgN-1CLrlLI/view
Malware Config
Signatures
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 drive.google.com 5 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2392887640-1187051047-2909758433-1000\{7A2DF009-E83E-46F4-866A-54385BF29F35} msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 484309.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 5088 msedge.exe 5088 msedge.exe 448 msedge.exe 448 msedge.exe 3544 identity_helper.exe 3544 identity_helper.exe 3120 msedge.exe 3120 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4084 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of FindShellTrayWindow 41 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4292 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe 4084 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 2648 5088 msedge.exe 83 PID 5088 wrote to memory of 2648 5088 msedge.exe 83 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 4232 5088 msedge.exe 84 PID 5088 wrote to memory of 1948 5088 msedge.exe 85 PID 5088 wrote to memory of 1948 5088 msedge.exe 85 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86 PID 5088 wrote to memory of 3752 5088 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1GD6awR0q_3xM6wZDtFIsuwgN-1CLrlLI/view1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff849ee46f8,0x7ff849ee4708,0x7ff849ee47182⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:2364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6524 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6600 /prefetch:82⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6400 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4700 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6272 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6892 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6872 /prefetch:82⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6980 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6896 /prefetch:12⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,17101764016425742582,17479877014568274959,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3432
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4292
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD546e18c1fdb916469390f1de03744b5b5
SHA19d7cc456586c42dda19892c35591d1e29fb75b05
SHA256065e9d0f615fba792ed1317c0adead2b3386b4be4aa8910c0a16f3a854f73be9
SHA512d57147c16a5825db89c325b6ab1522f40c52d17e5cea1123effd69fece749d3618f2d2fe84a25910b91e76aaf63682171ba3089759cbf908da14e21ec9a6c2e3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize384B
MD5cf6202fff53cf320750dfd3f3f10dcac
SHA1438b831ef785c9208f3d0d8da1c25b13a318614e
SHA2567fd3ea00927da531d22a895ef35489bbca3398e80169b09d8c1aa8be28ff9487
SHA51293393bc50261cd4636b69532b2e739217e12834751c854fca08fd1f8c810bcdf85bc76c269e4e3e2eec79969c9a6957fc76f0d4b8c41a99abb5279023fcc74ed
-
Filesize
7KB
MD5507eb55dbf494e84352c0915d51ca85c
SHA1be71cd743edd3b0c5c18d238977115b9ebffac04
SHA2566a9c875fba14a8677a32196b5e3e407732aa4cff15f5989eebb27eff0b4b456a
SHA5126ee0bea829430e31c1b471be25ab0a29d1a333d3142e73050dedcc6e18ff9349d3c1f41cae84bbc78b637d7e193d5b3d1644543337a49404cf2b10ce39010a8d
-
Filesize
6KB
MD5da158517db51ddf69e0c264dbacf8bfb
SHA17f6e435fb3cae69bd3c3a11e8561e3e7200596ea
SHA25609a7deded37f9e7d49d02c8e0a09a1c8b31c6a448b4edef39e2d5f995130f086
SHA512bb2518f80b8400a4cbb1e0495f33a42e4c6ae3e5b6eac7db97cfba9c56d75a98044558f5f29e269987f726b3f2f0a6da4f818c6b7139b80ab583668fc84a8ca2
-
Filesize
6KB
MD5913939f4cbaad56fc9e87602b5e4cf68
SHA10c9ea67b9789e4ea3836798fda95ad5a001f40e9
SHA256b97e8b33a73b2ac8e8d9ff674aae96d74b10fbd2a77f11dc15cc46e28a5e52f5
SHA5121b851305aab64077847a99be1748a84a32c6b30a9571a1c4dfad7a1458165655090cb48f6efb3dac41192bfa4311d370480353c9b235741b770893062a36da08
-
Filesize
8KB
MD580ac81d36fb44a3c3b3dc4f43c737e60
SHA19512d1517eba29049039b8e041fba7a0ad642c64
SHA256a0757ef8be80c568a50171e2b5c943833824fd09cdec3d7170a229d762d6b245
SHA5121aa613da136bb9d7fffeaab96adb1853614b2e56c8120d80f3898c6c98dc3020c3286e961876e86b7b03a112ea83e1887dff896be54fa129b7bac49517864d54
-
Filesize
7KB
MD5a34fe78201780f5adf977baaaa8aa8d9
SHA1a8d91dbc7308634dc5421d80865888e4edd7df88
SHA2569df7ac4f9ec6e511bf986e2a85a5d78dc47b5ba802e23d0a7511154e1302e739
SHA512bc7985156ad91444e2b2c6169f3daa672bae073063ec91f91c7a49c05363c7abd3709617880291384e87fc2277e45690f3aa46725a884ab7b72ca4a2645b41ae
-
Filesize
7KB
MD5d29428178981b6b89913d2437a3e9940
SHA1c61a2ef5d996e103cbb9b7e801cadbda6a3bd78f
SHA2565c2b3baaa94ba1073eaa75870bc4d08720a6171dca9a35f6194da008e3593028
SHA5120bb4f96677d8bce052adc06892649ccf7e551b453f8e4c138784e4104e421231065908e185a4f2f3d584eb37de1e63bb0815485874518f0e784e49aabace9fda
-
Filesize
3KB
MD594129e7e7d389182f8338d008847f9a0
SHA14150793cbce13805387145bb9a056604beb943ee
SHA2567f60d624fffdfdff40727ff21eedecc3f20353547af461a57d5fe908b4f9a769
SHA512516f5c2b4d2e361053df6c5384604ee79001a785b07aeb37401d768fc103eb533d33ee9f96441dccd539a534639ec6eef5b50868b8bd9ecde4fd8873d8cb61c3
-
Filesize
3KB
MD5df131e57fa8580fdf9229791055ab403
SHA1776c9683656d55cec82091df4fa0ff9a0c7b96f1
SHA2561eabedd7edda2eda6b5da87629ef9a413444c90e52933b2a3cf750044310ca28
SHA51209bf7d42840342ffcb2213dd9835988ef8e954fd86d9e5b9ac05534c201bb34858d0929f9124bb97245c03b95977ecb867574cfa9662fff62eb37d3bdad3da07
-
Filesize
874B
MD59ea7c46be893840a3d32ccc29bf3c125
SHA1c2692dfa9002e467e4737b59a605a4ed1b3f2188
SHA2563aabe2cd658b55b35488caccb5c1bc0e404f2a8754d8a87ad68f1facf3da0f76
SHA512550683219e5ea47ca99c11216490ea02ad8528fe682869a816bb19277106b16c76900b070788ad83ae94f3d6db8f444137887063fa80d8aa379b4f833e06595f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD577dcd2b5e282c1b84c3e528ac8373469
SHA1f91275a89277911e08b25df98c6c58ff6bc772b0
SHA256ed07f62636b8325684688890f4dc9f8c3ab21286a42d541c7a01930fe00cd7ab
SHA512bd8121c8f6a067872dbe79eddb667b5c128aaf33f9354260c0a4f7120144a449b6f2810d5d32ce4f2807c194ddb202c1afa8671e364588edecb91f49e31dcde1
-
Filesize
69KB
MD576cde0e2cc47f915cac55c5c9746cc88
SHA1fa41acc96264ea55ed199185af8d00a40df52905
SHA256f695e35c543ea02e674875b561775b2c98b74bfcd5a5bbf861fca914ed2fcc6c
SHA512fc73f03ba6975c4d9baf5099d34f0b74d2b063363ea1220107bed5fd54d2835f245e1d1d5d5ef8d5ed8be46223747b40b7b657fe118db67d93e29befd1c9beea