Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/08/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
ca.brres
Resource
win11-20240802-en
General
-
Target
ca.brres
-
Size
90KB
-
MD5
57701cd81e68bcf07ee896a84f0c187e
-
SHA1
fb41f2cefc44edfff582192197327b4aa8e72463
-
SHA256
9b435a7bad97314fd90ec1ba50c8287291c906702006d2c6e00c85c3bbd446ca
-
SHA512
8fb9db5f7d6d4bdb503210de82de201e1458a2196497f50733f1caca2d19f6ad643bac2e1803a8d942e8497e89a668c9682fa2d850ae1408605b0f30ac888728
-
SSDEEP
1536:09jAWxwkMXP/WeL2uKK2mSLJwhox9kjyVIVtmO8AruvNDxMc6Lk:09vwLXP/WefOmIr6yOVtrryNDxV6Lk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2227988167-2813779459-4240799794-1000\{E5C93837-FD62-4935-8DE0-E11E1FEC127B} msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 1960 msedge.exe 1960 msedge.exe 5732 msedge.exe 5732 msedge.exe 4492 identity_helper.exe 4492 identity_helper.exe 5396 msedge.exe 5396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2044 firefox.exe Token: SeDebugPrivilege 2044 firefox.exe Token: SeDebugPrivilege 2044 firefox.exe Token: SeDebugPrivilege 2044 firefox.exe Token: SeDebugPrivilege 2044 firefox.exe -
Suspicious use of FindShellTrayWindow 48 IoCs
pid Process 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 2044 firefox.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2044 firefox.exe 2044 firefox.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 664 OpenWith.exe 2044 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 3196 wrote to memory of 2044 3196 firefox.exe 83 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 3520 2044 firefox.exe 84 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 PID 2044 wrote to memory of 1916 2044 firefox.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ca.brres1⤵
- Modifies registry class
PID:4808
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:664
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e61c5e6-a4d5-4ebe-971e-a1a5373e8997} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" gpu3⤵PID:3520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2376 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddcee040-2d1f-47a3-b7f9-847db8770b54} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" socket3⤵PID:1916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3248 -childID 1 -isForBrowser -prefsHandle 3244 -prefMapHandle 3240 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {afa5704a-2d2e-4666-a4fc-a7163aeb9580} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:2152
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3560 -childID 2 -isForBrowser -prefsHandle 3096 -prefMapHandle 3624 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64c38ac3-4918-4657-88c1-482729f665d8} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:3856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4220 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4152 -prefMapHandle 4156 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fd859ff-d8f8-45bc-b4fb-d6bbb1dba58c} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" utility3⤵
- Checks processor information in registry
PID:3708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 3 -isForBrowser -prefsHandle 5388 -prefMapHandle 5396 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b111328-fe9d-4f37-813c-02415adceef6} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:3200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 4 -isForBrowser -prefsHandle 5520 -prefMapHandle 5524 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {22e396a9-4a7b-4ae2-9078-8a88aa45bad6} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5728 -childID 5 -isForBrowser -prefsHandle 5804 -prefMapHandle 5800 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {521ec96a-3389-4806-b8d8-71518c6a30b6} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:2800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6240 -childID 6 -isForBrowser -prefsHandle 6232 -prefMapHandle 6224 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36911490-3d51-4094-806f-a2bae16a950e} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:2512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3608 -childID 7 -isForBrowser -prefsHandle 4000 -prefMapHandle 3856 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 972 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74fec4a7-107a-44ba-a828-9e32c6216c5e} 2044 "\\.\pipe\gecko-crash-server-pipe.2044" tab3⤵PID:5028
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb97b53cb8,0x7ffb97b53cc8,0x7ffb97b53cd82⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:22⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:5468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4620 /prefetch:82⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3264 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,3888664115298460383,8414695361885587369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e8115549491cca16e7bfdfec9db7f89a
SHA1d1eb5c8263cbe146cd88953bb9886c3aeb262742
SHA256dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e
SHA512851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54
-
Filesize
152B
MD53e2612636cf368bc811fdc8db09e037d
SHA1d69e34379f97e35083f4c4ea1249e6f1a5f51d56
SHA2562eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9
SHA512b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d
-
Filesize
5KB
MD5721f3738f877c1a2c9c941745c68545a
SHA1e0b8fefe15434316be85aa83b450948c31263530
SHA256d867c13460d9b853fa3373f720367a8cc60c272ef22085393b149557b51bd3f6
SHA512991cb8951a6371225f76d5e5da55fbd2d19d979a9141f068013ad6ac8ff49299c34ef229b38192c9422751d5c89d7a4c0b2407ea0bee913c9dcb8faa016c2870
-
Filesize
6KB
MD59c3a966c89f6970fdbc60f9bdb4a59e4
SHA12f924e0d27110ff57a0daa3e4d5b26629d37e9d9
SHA256b9e163844ba92cd1221b314bb89ae131231e51512545c81743e319da2fd86819
SHA5123c8f05fe93cfbb36b09c2d530d52c93c53c9cf3170cab3cb2681e77773b1489c98423fd2b69797529184c42a8168b8e25c86ca52b71c7704e269a0e8922d7a0b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5c3208115313c38b4b9c5dd1552c3a1ad
SHA1782490dc44b13a3feeb12883e9be04b7c805ca2f
SHA256ad6fbed5b688fed176ea9bac36a95a26911b5582339947dd9fb38e490acd6b4f
SHA51225c391eefd04fdba8a6e9e8da1e77dbc0979eb5b3b65becc410d4b2f786c78fe72c71b00dab00c2d2019132580c480f7c0a8451bb966cc500a127cfb583818fd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\activity-stream.discovery_stream.json
Filesize42KB
MD507e2198fe815b6881e529830338f52a5
SHA1e8544acd748cfccc6f55e035ff200440ac538521
SHA256412ab2b2205fc882e5c4db15470575b3cd4f51bddb967a94527b9d03d5d6ce27
SHA512c1a37f90ab77e8b6ad4b78477cf9aa7f186f0e198ce9cd441d511af75ca0227b6fe02b8cb3c2ad84e4eb133b7aea71219c1d317b8ec0014db925446e611a8ce8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\cache2\entries\8009AA7615959742DB0E2C888BACB228D61FBA60
Filesize60KB
MD567a5558e661318745c640e2038de6faf
SHA1af35bdf36be1c2fa84be6f194c0cb86a15f3acca
SHA25664da01652fc9fa97e322303448b05d98c49affd8ab2abf48a65d4998cc2c769a
SHA51226766fcf2cbb44c6067ba29fb0e0654e45ca0097ff57787aee60f1baceb1aa73350d113dc2fd264772d4c17176ca96f6a68f5b2df52f24981018faa9891e3aab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\cache2\entries\8999BC8CB7B8114B87D8185D8CE1BBF1E6377016
Filesize219KB
MD531b95b19e972e19dbe489069c3e5febb
SHA102d16bdec4e006a831dd392f6755cb7d5112ec29
SHA25686defe870f384e400c43da7038c602ecdba707354d12422ff846638ab8af4103
SHA5121014493bcf1d0a2f0dc5d10b7258776b051d7b04ca6985b51628778029bc5719e12791265669f916e5c023ec7043216d6cb24c0f68820307c8953031e96d0962
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\AlternateServices.bin
Filesize8KB
MD551c76b439a7ea9a23ab321c533c2a2ba
SHA100efcf5c677bdff85fa5dca10803f465e7292a16
SHA2565d9d65ed8c8b4c94b105924b4479e75f44089a69861a2556f0c73b0bf0ba3b2f
SHA5123645cfc20f48d73aaddc3f0e5a8a4f4fd3e5495c59ba94ead0cb7e5aacce63bf282ecce56f8d961eed38cee38ebe685dec9961ce6a779c18a51ff8ed83473448
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\AlternateServices.bin
Filesize12KB
MD587e513adbaf9d2184618ffca21f31065
SHA1aecc26911c3e18c1eca27533c364e4b7890a0615
SHA256e1b4521fd2830bdc479690323df0a2b243a9a1e3ae9b57d63b42da0caed302e3
SHA512131a535e48793dc81bcf6ae16a5dbf704b0dbbb9a9bf68fc9d1b44d355f016d9b8c009480b2fbb93c2b7ee40cf5bfed17c3ead82b0c5b540bbaebd691e4c0c04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51e1ac2ab526963db2523c42c7c8b5304
SHA1eada3dd174f005c33109d854f3418761c6498dbd
SHA256bfbe9c178233698394d1ff1deefd949f4ca3ba9ee4a4ec3c5ce49f3bbf792212
SHA512abcc140e751481274574f1ddabc28dc82a305f66e4cd6c5f4031a36076b1d803c1578796c83d623746be3d6a61b21d4b789295f99c30f4e89e930ca828c19126
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5af8d6ec3cabdb63d17f678a62bec33ba
SHA1bc9bcbd41a0c9aacb3c0fda18f9cfb60d6d4a530
SHA256d27bcc62496e7c2584d0934d8d55cab7f17889ff199cdcb5133ebeb31256fa7a
SHA512ead1a8bc730165b5cf650106ccfef27acca27ec2482b58d4ef368503f538173b77636d09fd305b7fe89e2c70e6f0636bf92758cb3f12cbde6442f028a915c85f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d50ee04c5587e3f89339d30c1e105a01
SHA100697a66ba3957e20e3bd6f5d162bf8dd4c1f7f7
SHA25686b76abd3df99e0e776d3a3d0b0f576b316bcccb895b823a3c1576ca166025b6
SHA5128219e775787f916472bec0eff24580263ad4cd07e5928cbe07297d47b9592f07b5e9a2473ab9dde51806716d08e7fb5f4087c27df2762c0333bc0f6baa7a0712
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD589ee325de767d38a71c644799c073900
SHA1b3bfba042a9af19648cc73bca6d734802ae68554
SHA256ad0f9f73f92fe50b88f357d05c7f50cc2075855b6c2c87c10e11167d622f98a0
SHA5125db250ea4ff37f429096837237c46066caec1139a35f7264107919640baec4563eb23742c32e98d4be69060b6453b9e7628481e06c187588ca87f4d795c49351
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\22abc76a-ec46-480f-8541-67cb67f05402
Filesize846B
MD548293c47b2f73a8ffd75d99c56b5c1a0
SHA1d6009a0b4ccaa3bd663fef11a84c6409114ea4f0
SHA25686f0f34e4430d2250021d81f0739c5413925ab0b7f63047b8107547ade7adde7
SHA5124784c1b68ace3b0d3dd91bc5ad51d8c24cebefcadb1a3354956fe9f7100ae204e98ceb62ef06a8cbe6987aecd74d39adccb9ecf5c73fa54f520f4590aab07253
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\5401b814-0019-4759-95ec-3c93e8de289e
Filesize26KB
MD529aea277caa9db74c6799e5de85b131a
SHA13e50ebab9b8a06c2222cae11df9d7055f03c15e0
SHA25699c7fb26cc17e79d4b796c295a53ea5f20397cc01b5998513d35fcd46064eaaa
SHA5126b234566be8b1c6cc801a86b571b173e90b26056997038e947d2fc9c789cc5fd8a36b42a3936dbe4c10eda84e0892f4b334dbb231413c306c54dd82580b5f848
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\82607acd-3a07-4b38-af00-11a2b5e34c3b
Filesize2KB
MD5f9c52513791dcfe5aa0104073364a577
SHA1c0b98c6858e89f0bec5c6c744775f93597242119
SHA256cb9ffd54430a125f42c14b3481237f6f1ccf9080b8cdfb67d477e182b396e26f
SHA512aadeb968e028a925749634ad1bf34b7c0266dda621e483440d2c6faf0aec6559c43f378921c9f62b80321de6ac3e0450276c1db07035a170c7dd8ff4dcc1393d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\dc40f47c-f25f-441e-b0c9-86453b24dd62
Filesize671B
MD50a151da0f05b4cd501da45c123d56c77
SHA122fe84521ed05ea5dbc7f2d610ff983aedef9fb1
SHA256a3d30c2fe6f2f88ff7c5d6b0f67cd9a1430527b9282d79ca43ada164e9040109
SHA51259ca416e1f71f6037f702032a3432427684d00ad9c907e3a3f3ea945dfc17f3641063b1fb298aafe5c5c681a6e0ed7b1304315683a0ca396d69c70578b536bd5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\datareporting\glean\pending_pings\ed1d50be-537d-4c6b-a0bf-f1a4d526e29c
Filesize982B
MD5629ea7bde2977b67298234346025664f
SHA16aa627723634ac7c3b178892ab26c07756c00213
SHA256edd1e0e846ee1b487008804a95bff5703d9a98e71e3091bd3210f13487a7f2b5
SHA5121caa7043b96dc3836800b8cd6a059c9d11fde08608d5b9893a2fad8c60e6dd4d022bc99fc8e1d2f1b322666761f3bffebf76d132558615211419be4a4f999ce5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD565460d3a83faf08eeca9b1e65b05c8bd
SHA14f741875c7ecffaab149096ad1470597e6fa4850
SHA256a4ea7b1a57ed3be5538f51908680f1c4b82ba10b2aac39ad62c25d86e75681d1
SHA512f6f31a6e68c2bde89af1e34c15529f44f596a4f0878c5648eb50928df7075b78f8ba0de7c6cdfe65f64a2cb32cc194805b174615449d24e9845e3b86a6916747
-
Filesize
11KB
MD58855b6522174d1d4b98977610977436e
SHA141de5e6e5c835009b8eab9ca32da1cddea0a6610
SHA256aa13ca77afc8e08f92b2416061d57a554d9e8afd2355ba59e6bdd10089536d64
SHA512d1fe53baa96dc1dc02a89fb622f1292897ff4993a39e6e224dfccadb628c46e07d388a66118ad4e86799ff8ff6d2d0c573f76a79b0b8ee883d3a4d21ecb200be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize4KB
MD5964eb11fd2770d850213257bb52fa64c
SHA15d02fb6bc0aefe9ab197803176a47b194fc923a6
SHA256e283a8e34b19442a88e8c0d0650a8ae578ac25360f6b5066aeda64fd5c8a4566
SHA51282e7166c603a43a7ff43af1fc70cc156bf92e8b3da45c58b9619308a69bd6003cb21edaf6166ce258a9e39f25e44e3532758536b1f4c9bc67de713cbcab10e12
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD55072ab19da0df49727ed075b5bcd7e77
SHA1d991085f3d6d3a83ebb3b6994be1b4934e6f5c73
SHA2563b660d1ce763f1d40659c0b4586c8c486c83ce57b830ea922332746a19f78262
SHA5129881f804eb59d96ed45c4915c23e97f40bb23d465cad12929f934adc228772843451d799ab189a67fb4e78c2065c7b59014f003d520696d9072dbe4a53505b39
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD509dd1b42c6a3f2130c8860ab0a7051b4
SHA1acf4675a823472ef87b5aa383e666deb558325ed
SHA256cf7211af072797b996f9e13904f646c970ff8da590826f47e2cddf276d421390
SHA5129181378e5074409709ef38d3ef801fb24e68448f72b0fd28758690fbb62b726284a70047b9db5a681c7d2531bf47d08523832e6e8329de715aacb40fd7820c0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD542a07ba64d586f0960b32b278fad9e4f
SHA1481eb7f10c8a9964414d62a92c8cf0c83307ccdd
SHA25689b362175097b2cf40e2ce67de793b4d2d3f70742f4846332c228a4c28e27e68
SHA512525744b5ae52c3fd4b2e616718b176924cff29580224b4deb12b01eddb53a6ec0c5eaa92b33f15bc93079c686fc96541b124b34928ef885327cd882ba7ade2db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD571ab4cab9603f1e11af2b0039ab8c54e
SHA15e99ba55ebd8b1373126f5c0e7719b91de1755c0
SHA2567dbedd396d98780d5f5b0e0f3cf17894d6d0c9d5a8f06aaa4f651abfa5d763fd
SHA5122345f08dc9a195852ecb8025070dee0fa11e73281e31821fec22668f6ac817fb258617b01d3602dda05e757f67e3393cb3c95c35c1d9a0a18d6655b0721cd889
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ybdgtqfi.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5e999d9824f7af26ce22bce2cd2160e2e
SHA10edd4889ba411cb24c3e6a8f5a433a36f1ec632a
SHA2568c7cf60168b54791cd878242fbe98ceaec1ca632e4162df8f3a55ab4bde68dc5
SHA51252c076aa9468e51b12e820f44f64fa4a705bebe553c2f683bce942eded41e8f15365bc61542302429007ecbeea78ab5ed65f0ef241df53391513b58ed16b3b8d