Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-es -
resource tags
arch:x64arch:x86image:win10v2004-20240802-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13/08/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
expediente_89a9a5c640d44fb49de77b5d05db8461.html
Resource
win7-20240704-es
Behavioral task
behavioral2
Sample
expediente_89a9a5c640d44fb49de77b5d05db8461.html
Resource
win10v2004-20240802-es
General
-
Target
expediente_89a9a5c640d44fb49de77b5d05db8461.html
-
Size
734B
-
MD5
acd5771beb9d911383ca2664edccdc0a
-
SHA1
b084f03122dec9ed2c1773404bf64335b4f1a942
-
SHA256
a5a8fef1e7cdeff06204ee5b332fb2e62831614207b86d45973531fadb8d7ccb
-
SHA512
76444f1f343a28289e253e536604b7127120ab68a537b367bb2f69768c9e24be3bf2d4f0bf018631381587a3b9c18adb06c04f98492c196cb064ae82e560139f
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 87 5500 WScript.exe 89 5500 WScript.exe 91 5500 WScript.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zoogloeic.lnk zoogloeic.exe -
Executes dropped EXE 1 IoCs
pid Process 4308 zoogloeic.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 61 drive.google.com 62 drive.google.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zoogloeic.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings msedge.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 100 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 1288 msedge.exe 1288 msedge.exe 4136 identity_helper.exe 4136 identity_helper.exe 1492 msedge.exe 1492 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe 2080 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe 1288 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1288 wrote to memory of 3876 1288 msedge.exe 84 PID 1288 wrote to memory of 3876 1288 msedge.exe 84 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 2752 1288 msedge.exe 85 PID 1288 wrote to memory of 3972 1288 msedge.exe 86 PID 1288 wrote to memory of 3972 1288 msedge.exe 86 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87 PID 1288 wrote to memory of 2084 1288 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\expediente_89a9a5c640d44fb49de77b5d05db8461.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc953d46f8,0x7ffc953d4708,0x7ffc953d47182⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=1476 /prefetch:82⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=5676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --service-sandbox-type=collections --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12669785457368050200,8531885370704091869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3484 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2080
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1660
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5140
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\tecolatam_sa_de_cv_5313080642_vbs\tecolatam_sa_de_cv_5313080642_vbs.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
PID:5500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://is.gd/JZ5YbH2⤵PID:5656
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc953d46f8,0x7ffc953d4708,0x7ffc953d47183⤵PID:5672
-
-
-
C:\Users\Public\zoogloeic\zoogloeic.exe"C:\Users\Public\zoogloeic\zoogloeic.exe" zoogloeic2⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD52a7bf60a2b90fd4d9f32e5b86d9c692a
SHA148e49582a662b68c3ea8b4991aac44fc4a848385
SHA256645508fdc1d184143abe41e32d775eb65287bc2b37f63dda285a498f82b0fa63
SHA512ddf132fdbb7043b92cb9b655d3ed65344d5370599693d6f098377aaec961db8ed0f4cbf877579cd25e68f221c6455bbad03054c1198ccfc974555280b1ff94a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD54f7cbdc628feed6772c442213b6126df
SHA11a1efb4bb32e7dbfd8f976a304c767843797db68
SHA256134ba7a1c1a46228a9f0be6497b9d1d420c4fc4fa3d4f4b4d6e405862494e1c9
SHA512497ee24545babd83cda01203480f092b19c8b927bb9bc9073d82184ca7ea3068021b65433ff07fc86c4d27fd9f0787a33c15994ed2b7d27908147817017de6a5
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
865B
MD551659152db6feda60a77f161e6d92a21
SHA11fca3278fb6d278b152a347a634c98e7de6eb567
SHA256469d17943017fa0946515d6ab4b2bcc1cc5604f9788abef90dd81c6f3a317ae5
SHA5129a6b4ecf93b35efb97208be26fcd0c642d2e6a1fa7c2e2fabb28dedd5852ffbbcb58aaf9d7c302af76c1577b89140cf35ba2fcd82801a16552aea4da5b184d30
-
Filesize
6KB
MD5198833e630a1a105bea764298f7c8397
SHA144d22c4b863fc1a3762c28f73d374164dcf47c1a
SHA2567cf91b0e052c9f1bb68be1ba62e12403111fa697bd13726712583a5e49552a0f
SHA512b0a6aff964b4653be13c4873de71234017eb6952fb4bda6386d223ab7512bf6164e547837ba64772b87b7842c932b9d7d8462b9556863ffbc68dd36f85a5ae20
-
Filesize
7KB
MD5f71396776c9fd6085b217ceb10893032
SHA133375d89f56ac578dca13a8f2e236720ef6d712c
SHA25679ca6ca6922878449ed6d0aee6994b91a74194edd98b118535791ca122d8945d
SHA5126a69dc230e40c61b718104a09e9e7193d43f9e7a428537e1ae63f6c3c598183add6bd6df1df03d6fdf9d3c55cc09c6421c52e9ec7c2dd313161c88f4489ba08f
-
Filesize
7KB
MD570b180ec864957068414d15c012e0291
SHA143713d86086d551a0be52f81335850e77315c52d
SHA256eb919fbf3f44d68d46506c43e1daa27adc290f5ad1ab3f166684577b97d3ff61
SHA5126cdc5d5a6bd185de46aa27f7fa208fd1fc5b007cfe2ddbe786c1d9fbe882b3e1d42744d431b8e2af21e036dcadfd6984b5c1b9e31e91d94e42129186bdd1cf25
-
Filesize
6KB
MD50c58127fbc0210c367861c9e52c2020d
SHA17b4d4acd344ca3e38a362e8c1970fbcfe0185b45
SHA25603f5fac69a4f0ff9d549730bd68924e6a7106495a97c4bbd1f69ff0a154d4a7b
SHA512b38de42483acdf7e48df8312bdb59a6ce75a1616eb8d2ed1b2c0a8dcf7025703e55cb1e9e76546f338f29abd0c446cefbf9aa58d04f9fe814aac7e23f391fbf3
-
Filesize
372B
MD593cd547eb12522db650e7ecf6609992f
SHA10e278330f0d22e1e9d5bb65f5ccf311d31f537d7
SHA25693c176efb69dab67772b9c6f8ace68d3ac44c20e0a895677e019bae71eeddf1b
SHA51247861a0531fd8ce1716bc6acfd50cde404c80d1ca3377ed33026680e9edce0b3eac271006423804460ca48ac462ece3cdc16276e97d7d54b3a8fd1a1899c3b2f
-
Filesize
204B
MD574327ba22494d8adc0c263cfca3df547
SHA1f584c4053202fd497c01f396c7fcb9de37e0faf5
SHA256e160699dfde618ca7a1f9a4a85303d3ba35eac397994d69afbcf9aaaa804a25b
SHA5124d8a6f5545cb25683bae7a05133097edc56d56c9b187977a4f5abf7fbc87548f502c493b8db85ab2c05afa7e98a8e61500075707ea432147dd3cdea6cee4236c
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55ecdb3db7a0d71200e185b077aabe8d1
SHA1e17d655a25747ec3b4170739129c5e4be37edb85
SHA256bd63f7b2cd45f59d4259e3bafcc9fca889d66e37eec67ebedf0d9922742be1c0
SHA512e536de36fb1e6bc429bad962cbc7b3bf789fe9332f30aac57e00e0b14b58a9211bb42f210af9accf1e3b75a670f97881a1ee944f9a0b2c98a8e917b44d8e230d
-
Filesize
11KB
MD5faebd20be1caa224180282b93dfabbb4
SHA1f03a472aeda27c01c891306b466035f17bbeb71a
SHA25625f4da2bec13a00edf58f3001d57e64a20c48680f468a9550a4a30736dfb8f3c
SHA5124486e3216a3a1c2b6c5d5e5b5c87830ac4bfb9bcf244258c9ca688e3be733021fa17dd9dfc889af2fe13698918c29f15a5657cc04a94d0cd40aba8aa15543ff0
-
Filesize
2KB
MD551ef5c16007559fbfe7a807f2c8dcd2f
SHA1fa3fea7a857601c559fc04a67be437844567198b
SHA2567e0f35b78deaec9d67493243ea89ac233b93312b47426825c7ce192777ada3d1
SHA5128cd9a15781f572c706828df932754c66238031a7f19263522681c7937954ba0e42e3bff5e34bb0c3420403b0f1fdf6f149e4a3d33376a7ab75e700ea33f7bf4f
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c