Resubmissions
13/08/2024, 19:35
240813-ya2ljasdnb 1013/08/2024, 19:32
240813-x8xjsswhpn 1013/08/2024, 19:31
240813-x8dfxsscje 10Analysis
-
max time kernel
1800s -
max time network
1770s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
trucking instructions.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
trucking instructions.exe
Resource
win10v2004-20240802-en
General
-
Target
trucking instructions.exe
-
Size
810KB
-
MD5
70e2e8e0e4af94e41c25c6576234f27b
-
SHA1
803f302773e43fadaa72613718905369ac47c20c
-
SHA256
f9898f9bbef6d022dd0ce4343009f8d8ec465322ec384723e565a7ff0db259e7
-
SHA512
4aedd3f377b7ec0242a2f4f1a879293cc6768c8199237f9fbd30f90bee51de2702d56ac567fdecf933c21ab67add29eb57b22cb1776ea5ff0b7c34ae5d425a54
-
SSDEEP
24576:GUI54C07YR3CHSSKnKu/k3zPHdPHdTSkc14:7MGYRSsK0k3j
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mahesh-ent.com - Port:
587 - Username:
[email protected] - Password:
M@hesh3981 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3132 powershell.exe 1244 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation trucking instructions.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 api.ipify.org 31 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4728 set thread context of 4368 4728 trucking instructions.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trucking instructions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language trucking instructions.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Internet Explorer\TypedURLs taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4728 trucking instructions.exe 3132 powershell.exe 3132 powershell.exe 1244 powershell.exe 1244 powershell.exe 4728 trucking instructions.exe 4728 trucking instructions.exe 4368 trucking instructions.exe 4368 trucking instructions.exe 4368 trucking instructions.exe 3132 powershell.exe 1244 powershell.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4172 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe 3260 msedge.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4728 trucking instructions.exe Token: SeDebugPrivilege 1244 powershell.exe Token: SeDebugPrivilege 3132 powershell.exe Token: SeDebugPrivilege 4368 trucking instructions.exe Token: SeDebugPrivilege 4172 taskmgr.exe Token: SeSystemProfilePrivilege 4172 taskmgr.exe Token: SeCreateGlobalPrivilege 4172 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe 4172 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4368 trucking instructions.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3132 4728 trucking instructions.exe 98 PID 4728 wrote to memory of 3132 4728 trucking instructions.exe 98 PID 4728 wrote to memory of 3132 4728 trucking instructions.exe 98 PID 4728 wrote to memory of 1244 4728 trucking instructions.exe 100 PID 4728 wrote to memory of 1244 4728 trucking instructions.exe 100 PID 4728 wrote to memory of 1244 4728 trucking instructions.exe 100 PID 4728 wrote to memory of 1624 4728 trucking instructions.exe 102 PID 4728 wrote to memory of 1624 4728 trucking instructions.exe 102 PID 4728 wrote to memory of 1624 4728 trucking instructions.exe 102 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 4728 wrote to memory of 4368 4728 trucking instructions.exe 104 PID 3260 wrote to memory of 4380 3260 msedge.exe 114 PID 3260 wrote to memory of 4380 3260 msedge.exe 114 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 1272 3260 msedge.exe 115 PID 3260 wrote to memory of 876 3260 msedge.exe 116 PID 3260 wrote to memory of 876 3260 msedge.exe 116 PID 3260 wrote to memory of 1844 3260 msedge.exe 117 PID 3260 wrote to memory of 1844 3260 msedge.exe 117 PID 3260 wrote to memory of 1844 3260 msedge.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\trucking instructions.exe"C:\Users\Admin\AppData\Local\Temp\trucking instructions.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\trucking instructions.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tepYWZPN.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tepYWZPN" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE908.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\trucking instructions.exe"C:\Users\Admin\AppData\Local\Temp\trucking instructions.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4368
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa3bbf46f8,0x7ffa3bbf4708,0x7ffa3bbf47182⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:5236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9377200903937379038,1069643367922698566,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵PID:5616
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
6KB
MD5d95806f4ad623c6c2ff10dd08281a7a1
SHA1c3afda67d2a8dc574b8e480c9a5ff1a6ceca2892
SHA256cc94d103686a28520344f565f4fadc96a4618b7a497c9a0359c61986c2150c9a
SHA512f481f000aaffaa265d9e69befb57c35d5885153184bba383c6e1f93030727e3103585b5b52aa165961545dbdc8234fed9cfc7367ce8b091ee3e77867bcfe2f55
-
Filesize
6KB
MD54030905681f70619d67c7d34d46824f7
SHA126d7e903e9761b6dd7ee756393557c5332a3aa02
SHA256c63aee0331cc28edcd16bfc64e1a090d5a8fd2f4a1787acc3a4e9eb396e9d8ce
SHA51237436a81fe77a7654a75b5b3b3f08f73b7f58c42dcd7bde1c92188bb9e2a759d678808d5c719e7e4e8ac1fec94da2d5b9ac9c7a376e4bd744f84e7083da914f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5892ccf16e04c793cfb9b9a0c4fd015ef
SHA1d02bb1e6db07fb5d0d824a226367588277e4d494
SHA2565d524fa2d75eab636cd7021427b308f9746f9ed722c92c1233165c7c83541409
SHA51264e84a4d78ca17d4d110eac90e0355b8e4a13ea470f49cce2c10350ce6c928c03ff15e465fbbbcf3d9274fc7e965da6d1f141baa8b324bd7df19946c9fa787bf
-
Filesize
18KB
MD549b00236172aaf8f486e1b3a29064e21
SHA12faadf4c5b1bfa949e6badcb11524e6b25c7db0d
SHA25643a60f20eb5a7d260d74eefddbd34f84b77f087682582b645bb1bce2830d3e1b
SHA51240351fdf2c9139585c6e1bbc349d4d8018e855afef662b62d91065bade48a722faa7895e9328729c6cc072a78de6dec6cc6f127ffbcbcc6e516b618653ea5c2d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD531ebf05b8467e28ecfc3d8cde06393ed
SHA1201a88aba460c9c69831a0479e0351dbfc66f4ba
SHA2560f845c4aaa751741c49f3f2b088fae7dec30a6b28a5c4008b18129c8d6906af0
SHA512e5b8d91d389f4be89006df8824d6f0610b04a7858281ce447d67d82eee1340b924ec759622e1d0ee41583684f1163845f66fe885ae51797771b04605eb008f18