Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 12:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://roblox.com
Resource
win10v2004-20240802-en
Errors
General
-
Target
http://roblox.com
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\winnt32.exe" NoEscape.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NoEscape.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" NoEscape.exe -
Loads dropped DLL 1 IoCs
pid Process 5048 vc_redist.x86.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NoEscape.exe File opened for modification C:\Users\Public\Desktop\desktop.ini NoEscape.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\noescape.png" NoEscape.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winnt32.exe NoEscape.exe File opened for modification C:\Windows\winnt32.exe NoEscape.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NoEscape.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "198" LogonUI.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-945322488-2060912225-3527527000-1000\{4166812E-6EBF-417E-B6C6-EFF0D5ED05A9} msedge.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1764 msedge.exe 1764 msedge.exe 4836 msedge.exe 4836 msedge.exe 4236 identity_helper.exe 4236 identity_helper.exe 3544 msedge.exe 3384 msedge.exe 3384 msedge.exe 1860 msedge.exe 1860 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1904 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3608 4836 msedge.exe 82 PID 4836 wrote to memory of 3608 4836 msedge.exe 82 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 3204 4836 msedge.exe 84 PID 4836 wrote to memory of 1764 4836 msedge.exe 85 PID 4836 wrote to memory of 1764 4836 msedge.exe 85 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86 PID 4836 wrote to memory of 4360 4836 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://roblox.com1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9de7646f8,0x7ff9de764708,0x7ff9de7647182⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5908 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5808 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:12⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5004 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,11766305701159737215,16194018413707649568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4420
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\vc_redist.x86.exe" -burn.unelevated BurnPipe.{01BA583C-E59C-457F-9996-1046BBFB7654} {7A8DECCA-726C-4938-A040-03C8C5AC5C19} 50162⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2520
-
C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"C:\Users\Admin\Downloads\NoEscape.exe\NoEscape.exe\NoEscape.exe-Latest Version\NoEscape.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1716
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3972055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1904
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
51KB
MD5588ee33c26fe83cb97ca65e3c66b2e87
SHA1842429b803132c3e7827af42fe4dc7a66e736b37
SHA256bbc4044fe46acd7ab69d8a4e3db46e7e3ca713b05fa8ecb096ebe9e133bba760
SHA5126f7500b12fc7a9f57c00711af2bc8a7c62973f9a8e37012b88a0726d06063add02077420bc280e7163302d5f3a005ac8796aee97042c40954144d84c26adbd04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize7KB
MD5d77ee0ff8ed89768365671d5b020dfcc
SHA16b9ab2a479ea1fb91d3a4b563073299359f5350e
SHA256d83064df0b5f296e0491f8e5a4476977ff65d43d14181ed89989510e132836da
SHA512e86f229f2f0ac6ea12d3e862a82e11a3f6ef62bd6d921a2e78dfce3362735309b9d66f85753d8f64bfb8315b8e5d88d01103afcd0f93da0d8fab1c9f9ed11aa0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD579f00e2b51aaf08e6d0b3040581e35f6
SHA1a462d5e6e1ec84fcc589987b3e745e8df78b7a86
SHA256d9486c77eef7cf9332a59b727308b299ce3d1eebaa682f9d380c970d8b166ad4
SHA51259d1c06877d010c8af412bcbe6b3bf645e2298f18760b39683fc91e972af156566e435f80103a0c261b386b1f86ad52d8986a681b4cdbcd6d120e147853aeb49
-
Filesize
8KB
MD59897cfb43c375e8e57e7ee4576881762
SHA1a039726e75255368d08251981c86aa6f3da63e4b
SHA256ec67960cd827c43d56265bcd065927b9da552009df782895f422f0dad0217609
SHA512ed213f9ece8b56763e8608e8eb9ca4e43dd20289a14a26a21a6ff3aaeafad8322f4f1f5d7952a958da886775bebde6e7312e848b1831b8d77754d3c7cbcc9134
-
Filesize
6KB
MD543b7ebf3ab53963e6433a8326281fce9
SHA1d367ccc4779cf9a8b4e2bda56d21e5937f9d1c2f
SHA25637dfd93627839a2b4808ccf03c100213fe895b341a885a468307101c6d4ef1de
SHA512106aa28eb617426773f2df485bd047bc3a13cdc9649af84934a8d35a40f067c14803c787a0844a190a7ba62cbd726bc16822cbc8a143e15bbf8d0549ef6240fb
-
Filesize
7KB
MD573b1b8e98ecdc68af4514835da474f18
SHA15ad8d70e0bdfadeb260ecd78ac7f60708fbec969
SHA256bfacf49456d8bfd979d0a07c64c2be6d0922c66224f1814f1cd3959bac14bd56
SHA5122759da404515db4c19e8e1b7d52269721622c4871a21e3b0800b3db4bd97b2f5920bb292dd42cc8fc17ca0f7e814c88c7e7a5abd2751435b34d03dd521bfc41b
-
Filesize
7KB
MD54d560ee1055d49dfca7a8e8f97392c69
SHA1af9763b330a2ea00457f2d143a729fb33edefa28
SHA25604e6a5471d22fbd6be12f89b0f8f367154248946864585df16694be35936a362
SHA512abc21032cadcf3b7e1fd7b80be0221a66b050bd3d6e6b2da725997e6c56427b14dd65a37f37e7fa06d6ed8f77653ecfe4dc0618345f31e604a25682c5c2e6ee9
-
Filesize
6KB
MD5e293dc0df2bf6f05a468e84bcb3d8185
SHA11ea2502477e5365a708b6efebe5089c6fb9fcb3e
SHA256867ed570f448663d7ab86319a771abdd615b8dade4701f55549aee9beca1645d
SHA512929aaa92350edbdb615098b9b3a89c0361a7f21b74461493b101e20d33627f83d0f769f4fa46d7adc47321b19cdb9ea13589db8ba0a13c79f0e2e60372584530
-
Filesize
6KB
MD5277d61b840ed8d0f21a15ffae00443f0
SHA113a0359cd63611bc1d34c2679eb747ec3a97c1e0
SHA2562159421ea28b8dcdba0ee9b8429f7fc94bd64e203cd0dc090af9a51b9e70866f
SHA51241b929a853cab426646758446de01e45bb9274b7d312ef040e3f60bb8f7dfead9a015a332f6613130f45ec97033ae43b084f03a22216f4d2be5cef93b2c10d50
-
Filesize
1KB
MD580514e4f3c642ec7dfb5dc1ca873fd2f
SHA1f526cbac0117988e04fb73e6986c40bb7602ce94
SHA256dd903230109d546105bbb783138d2c517db136131d92f41ae33ecfbcb19ca02c
SHA512174a445fed311cce1d0c95661920dba182d82f17ffff913ccec3da99e712df37ab6682a0ec72dc746604b14da4a232fb0953b2f7b9749ca998cb778584dd4c37
-
Filesize
4KB
MD5a63298ac585275af18c080b6f63b351e
SHA16696146698152979239e685d599b9487d28dca7c
SHA256ad69d788a9803c239fb461fa1ffce120810cffa5e34d9f02bfdd14508040bf70
SHA51202ed8f0392a4549b3d00b989aca2e59961013c7cba56415f3acbc4c9f98fbb2d868d8302376b2f53befd1c064c309add88d0f8e31c6cf7992c8581ff521cd20d
-
Filesize
4KB
MD55172ef7067c52d54ab026fb4c2c6e214
SHA10d5b57de68a82aecdd7ea12ac6d5ee10ecebe0c0
SHA256a8d4316294ac8094be11043d72e9edb9ca30738fc2b03476b50951efd866f05c
SHA512c1118900a4ebf341cdf1018d40f3bb7365b590f030cae0951195b42563a727a82d49fe4414177a7bf6a1bd80b5fbea1eda65a186f143bc4b837d340e6a9f9940
-
Filesize
1KB
MD5cdfb2038caa22cd67f9bac99b6add284
SHA131d24556b044b4188dfcec6bdbac12c46b0ec189
SHA25683a7398a13e87564c0c7eabe3ddb8cb82551133d5686565fa7990cf7a2cc2dfb
SHA512140ff3feda8bf1421d78362dc015ffc22111d9f7cfb465922b57cd024304daeeff7ad2fb3c00387bdb2582ea0a65d6929515a32d24f33a42e6dcadce417fcdfb
-
Filesize
3KB
MD574af2b0f1c620b57e433e1a241f8883c
SHA11ba99bb53d37052d8b0dad4fc24fc243c43aa2cc
SHA256ffae5c9e4d0ef5b2ec66307142f352f6475074d6ae0e71b2b71324bbd456cf41
SHA512f489021cbe77034099f9d70b89d541050c5af43c3e5bfb6e899ff9010f589cd75b0350f1696a4def7d136e588be2ec53551956d486b330f240fbe0a4067536e8
-
Filesize
4KB
MD565bc7f5e50567b49e821833bef3da0ff
SHA17ec316db3dfa40f01469785cbccda69a1571ebe0
SHA25655a3134b7c8ae5f41dab1def7a030833457643da2dc842779621b2eac4dade88
SHA5121d55cd6325cd8f87242a2e831c31865178bcffe96af8b4829730e58e9c6fb88392e0d410a69353fb5f249e5eba2481b254ec36ffa248a30be3a14b9a85a58c28
-
Filesize
1KB
MD550ca28a862912d57df175d2585c7a1ba
SHA1224209fd273c5d124e4f3b92f34cbd55e8b15325
SHA256c28005d59519e7ac24f43822ec697ce6b25c43ceac60572831294d71611f4770
SHA51262e2acd7ec1cda720a887618828a5bf6dfea4d84b80d22e0f85a075b5c372dbae7c8e3f008843ef870f9f674a09bcfc4657c083ed62faed2c61bede7f0a5892c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e173f2d793e3f6fb00e231054e7eac40
SHA140fe77a85fe5ebb66a897517b4a228c0bbe8b938
SHA256e20bba3872138532bd8eaab5992f4003ae2ad42b562fb4d5ef9117f36704f524
SHA512a8c0a89be1f3bbebf1b7d5f6151a4328c891052ee1b143e2ce347eaf6bf5175639984b47f437e9d02a55067e365b8960f732ecc68b0d90c8143e2bc919138731
-
Filesize
11KB
MD5fdefd853dcec822c377528d7ce4115dd
SHA1a07289c6b7101e5711e8a7552972f8e94743acd3
SHA256f9e27798099d9518e20c2d6f3cfa0a07a06a3c33781c511e3c83e2df19249952
SHA512f621f8925e405a649d8645b9c5e0f82dee12da424f39c59d38d7d72a7bddd2205bf0415736c9ad97e1ae9a18af53b117fe29d44a85cfdf40ac025ab92fade193
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
118KB
MD54d20a950a3571d11236482754b4a8e76
SHA1e68bd784ac143e206d52ecaf54a7e3b8d4d75c9c
SHA256a9295ad4e909f979e2b6cb2b2495c3d35c8517e689cd64a918c690e17b49078b
SHA5128b9243d1f9edbcbd6bdaf6874dc69c806bb29e909bd733781fde8ac80ca3fff574d786ca903871d1e856e73fd58403bebb58c9f23083ea7cd749ba3e890af3d2
-
Filesize
13.5MB
MD5660708319a500f1865fa9d2fadfa712d
SHA1b2ae3aef17095ab26410e0f1792a379a4a2966f8
SHA256542c2e1064be8cd8393602f63b793e9d34eb81b1090a3c80623777f17fa25c6c
SHA51218f10a71dc0af70494554b400bdf09d43e1cb7e93f9c1e7470ee4c76cd46cb4fbf990354bbbd3b89c9b9bda38ad44868e1087fd75a7692ad889b14e7e1a20517
-
Filesize
666B
MD5e49f0a8effa6380b4518a8064f6d240b
SHA1ba62ffe370e186b7f980922067ac68613521bd51
SHA2568dbd06e9585c5a16181256c9951dbc65621df66ceb22c8e3d2304477178bee13
SHA512de6281a43a97702dd749a1b24f4c65bed49a2e2963cabeeb2a309031ab601f5ec488f48059c03ec3001363d085e8d2f0f046501edf19fafe7508d27e596117d4