Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 18:47
Behavioral task
behavioral1
Sample
DrawBot.exe
Resource
win10v2004-20240802-en
General
-
Target
DrawBot.exe
-
Size
3.3MB
-
MD5
64f9b8cce741f88b1e0d88cfdee49017
-
SHA1
33edee5f698459c5bf5689299fe47003fc80c0af
-
SHA256
27ae2d5ceb6572f729f0d400155c5f9694ae479a8cb8d12f8708023fa55ae4c3
-
SHA512
424c24bff808caad3339c4bfa6e7c2fed51f1138889b72e77e03c1ce8d9531e677852c6d2f1e3b1118078d68575f45948d01b36edc5bddb82a4095abbf9ac5ba
-
SSDEEP
98304:meNThtg1YtYav08quQw53bM1itjo2D89E4Q0:9hhcqepwN/tMo89b1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DrawBot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DrawBot.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1302416131-1437503476-2806442725-1000\{AC42C4E4-D3FF-47B3-878C-2F063F849026} msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 6140 DrawBot.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 1176 msedge.exe 1176 msedge.exe 4044 identity_helper.exe 4044 identity_helper.exe 2912 msedge.exe 2912 msedge.exe 5272 msedge.exe 5272 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 6140 DrawBot.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe 1176 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 6140 DrawBot.exe 6140 DrawBot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 2568 1176 msedge.exe 101 PID 1176 wrote to memory of 2568 1176 msedge.exe 101 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4776 1176 msedge.exe 102 PID 1176 wrote to memory of 4008 1176 msedge.exe 103 PID 1176 wrote to memory of 4008 1176 msedge.exe 103 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104 PID 1176 wrote to memory of 4308 1176 msedge.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\DrawBot.exe"C:\Users\Admin\AppData\Local\Temp\DrawBot.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4588
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffe918046f8,0x7ffe91804708,0x7ffe918047182⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5816 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5792 /prefetch:82⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:5476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:12⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2012,1176105082045269678,13463298723383708086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6796 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5020
-
C:\Users\Admin\Downloads\DrawBot\DrawBot\DrawBot.exe"C:\Users\Admin\Downloads\DrawBot\DrawBot\DrawBot.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:6140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD54c57f1d08db24f33bb15d2466a25c663
SHA1b52e13be422135f6fe81e37a92b788d973131de2
SHA256459c21afa32af4247551a77508ba19873e59932a23751dfa3811bed9fc96390f
SHA512f23e9354fc94fa70629c21fb70ae635e6fad1cee64aeb4e6a64f0480cfd9b983c9b73ee630368e817219e915a091566751b7e51d6953d20ca0a44a846876217d
-
Filesize
873B
MD524770106082148a1f1997a4351735b96
SHA1c54cd65fe66671bf86d6d22d797bb0e80ba9281f
SHA25667f2b9419243ce9b982b2a3654d79815578b52d42ec0e8681a41c382fbd79c5e
SHA512ba4d0897aeb7eeaf64c5e5fcc487ed542db9d4215fa1fc960a08e6bed025f8757a9642d2ae4e44e4370fa5dcdd1304b723560c246804dda6a5d975f449af9881
-
Filesize
6KB
MD5d1f9b23e0f3e4e69c03480a738c7e553
SHA14782090ce455aee02bfbd9987cfda7b122dbced6
SHA2568026a2412a6f2edbef23d0b765c7ef8554f66e7f61f4a81f3accc377da16f438
SHA512d1ccc968f1b7b1fe370f0703d6ab19548a6fe091552349897caf0e12ced1a0948110c79e6393b63bce3aa46c6e54800279e41e8353cfa4a8438342fe253657ee
-
Filesize
7KB
MD5ce5e835a8ceef0c30ec89eed6ef657f2
SHA14ebc9ad0f194e02cae8b985c77c26225bd445a4c
SHA256d2cdaff1d71334b8c4763eb683553d5758dc2e46a7478364bca3d9f128d97b6b
SHA5125d1dacd4e9eaa979aac1cf82e3d06d1c0a8786a420514fd92b463edb063387c538748d9bff2d16649d41689fe147c26cd40dcc35a40b36d02b66d11a2ec7014b
-
Filesize
6KB
MD5811c31f04a7c5978eff643f7eaa4f408
SHA14d9bf6ac4ecf0d9d5fc788adb390986519b05fdc
SHA256d844cdb4eb921f34315db7a4bd606d77d832e0fae11b0d67e9ee6755d2289d34
SHA512497164a379c615c9c7f9911bf5c6a44f256c9aa9d109c6673d1b933e83505b60a2baa7ea2bba7b351f0e5a1a136ecdd9291e2faf7d47de8f1cc8480bd8bb54be
-
Filesize
1KB
MD5d417aeba3cc3da75466182bb2cbfab26
SHA1170ee9808c88c247fa2ccdf0c2850de711f55ef6
SHA256c203d46647e770c736e98d5d46269a25196fde8242043e6ce72f0649ea3c1914
SHA51253b60b02cc420d5a57af619c5c30a774ccf3e4c176f320323c4953530b84f1fc096598376090d79d32ddedb329daca55213fc84be1fc9b415b9bd3532664468c
-
Filesize
1KB
MD549dd67fe755661c06032869d8a93524f
SHA18af6f2e50954f4cc24995c245c4845946a820809
SHA256cc7ea7a142638da244cdf404a0d529296a47f70f7d03ec42eb2aad1ab8c3e77d
SHA512529d5f4f375752c9db802dd544723a56ced1dd3f8c4166d253087bea49cd1a8fede6bc4223619aa10198395aa2bd334a335020434e11494e9100ea3ec9a923f2
-
Filesize
1KB
MD5efb4dbb2c97d28c77be0bab8ff1095aa
SHA1c49705e2bf9d4bfe4f691913d21fb7c09769c7b5
SHA256ec80513c7410c4c3b535198a99c64e715b1aad7b675ccc99e67e3b6e1d369f79
SHA5121b07e53e055e62b1cd2f2f255959f1bf5b3239162a2e46498f29cf4fab2e6e37a1c626d7112563690cb8a6cbbe52b96966dae07adb8019c7d03081066e28df38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5aba6028794fa61b35d26df5f99fff58b
SHA12b8e362ca62e9660b55c46d6cd7a0a8cabc8fbbd
SHA256c7e61c8c6b4ee9ae50525b323c3fb5fe0bab95e7a2a2bdcf0916e47a356a9f35
SHA512fb57ba83bc8861af9bf364b3fa595e25342cd9f95be1265d4c493652c03740f2d7d9527bcdc66b58b57edc01e7a7a190461b029d653b69c533916bca7393463a
-
Filesize
11KB
MD508418118e90eb7e3e73890b86d303ff8
SHA122e586aa13459cf0dd1c1dbff5e946ccdd3e31ef
SHA2568ffa972b5400201f9cc6ed20fe9003b735ff40f4983b6db3f6ae2ae84af347dd
SHA512f371a39646b2a2b34a369e7910fc34b44861f28ccccd2b8141bd6a9f1297a775d8603ee15c7d4add59c6132d9b11b36e0e408b95ed7c60819dd1d99996aa6419
-
Filesize
32.2MB
MD5569762e92960d9a2406cdbad56e88b91
SHA1f7852978d15205c2a3ee5279d3d4fca30c7b2ddd
SHA2563b1fa4d6b9318b717472753772fdbff5d8d7ec43d1e67f80d479ae15e62f66ff
SHA512dcf26b714a699c6ff970d61346a9668b42a8f5c43c6639084b4f081b8bf1d77bf734d22385a2d4909e6b6d73cc0287b9e546a9fb3c05c1cdc351313df6f3b10e