Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/08/2024, 21:26
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/drive/folders/1jIllogDv9LyZWHknASw9b2U-26SQQ0aB
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/drive/folders/1jIllogDv9LyZWHknASw9b2U-26SQQ0aB
Malware Config
Signatures
-
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\h2m-mod.exe\MaxLoaderThreads = "1" h2m-mod.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\h2m-mod.exe h2m-mod.exe -
Executes dropped EXE 2 IoCs
pid Process 6116 h2m-mod.exe 5284 H2M Launcher.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 8 drive.google.com -
Drops file in System32 directory 27 IoCs
description ioc Process File opened for modification C:\Windows\system32\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\symbols\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\symbols\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\symbols\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\symbols\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\symbols\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\symbols\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\system32\symbols\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\SYSTEM32\symbols\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\System32\symbols\exe\h2m_launcher.pdb H2M Launcher.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\symbols\exe\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\h2m_launcher.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\symbols\DLL\kernel32.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\dll\ntdll.pdb H2M Launcher.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_60b5254171f9507e\symbols\dll\ntdll.pdb H2M Launcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 445914.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 418739.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1384 msedge.exe 1384 msedge.exe 1776 msedge.exe 1776 msedge.exe 1676 identity_helper.exe 1676 identity_helper.exe 1156 msedge.exe 1156 msedge.exe 5768 msedge.exe 5768 msedge.exe 5936 msedge.exe 5936 msedge.exe 5632 msedge.exe 5632 msedge.exe 5632 msedge.exe 5632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 5284 H2M Launcher.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe 1776 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1776 wrote to memory of 4476 1776 msedge.exe 84 PID 1776 wrote to memory of 4476 1776 msedge.exe 84 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1452 1776 msedge.exe 85 PID 1776 wrote to memory of 1384 1776 msedge.exe 86 PID 1776 wrote to memory of 1384 1776 msedge.exe 86 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87 PID 1776 wrote to memory of 4992 1776 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/drive/folders/1jIllogDv9LyZWHknASw9b2U-26SQQ0aB1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e0d346f8,0x7ff8e0d34708,0x7ff8e0d347182⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1764 /prefetch:82⤵PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5936
-
-
C:\Users\Admin\Downloads\h2m-mod.exe"C:\Users\Admin\Downloads\h2m-mod.exe"2⤵
- Event Triggered Execution: Image File Execution Options Injection
- Executes dropped EXE
PID:6116
-
-
C:\Users\Admin\Downloads\H2M Launcher.exe"C:\Users\Admin\Downloads\H2M Launcher.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:5284 -
C:\Windows\system32\cmd.exe"cmd" /c start "" "https://github.com/h2m-mod/h2m-launcher"3⤵PID:5488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/h2m-mod/h2m-launcher4⤵PID:5504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8e0d346f8,0x7ff8e0d34708,0x7ff8e0d347185⤵PID:5508
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6328 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,416822654773936116,10388776136830382723,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵PID:3364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:6076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD574ac56ded62c5acb7164df15511ef7ad
SHA16c477d49b66cbe98cad632c1f5cf55864200bcd7
SHA25643be5d288c8fdbad40b653080be71a6d15e80ade7591af9bbf5f1af3508daccd
SHA512d877fcaad513097e6b7ea7305c97838e980f9d07b4a0b06a91cc00c10dd7b39a403eaf363c5cea4ef0c963e62577a5649a24fdcfc888d056e877f31544c777b6
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5e2f96d8a3829589beff5034fa9e58b56
SHA1d89d8ce61fea7e20a31824bf8836afecc40cd861
SHA256fdf15e8dd308cf773bc222c771bf54331e2c9f0ffef2cfffd675e9776f298d84
SHA5124e3b7003945132872e544b86d2b15260fc939055142aebb3411ffd0a37faf409e32efec456569372daa7b9498cb2e0db3010a07d28c0bbf725aa72780e719f51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b8f1c8a48af4ce513058d7cef80db1f0
SHA14b1f68491a28a1775559e25aaff5747bad9fe386
SHA256315e39c5727e0ec17d521f1c9b2bb409cae13a0ea28162916a117edd75a80973
SHA5126d9f198c839060a2c9a25d3d239da7e3bcdee612d0f57c9ae14ce98849d77f0ff9e11fd72bb3e97c464f32708b73d8befe1b3d52f69cb621a2bc72512f5ae058
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5ae0f1b40c4d776815fd4886c2af810ab
SHA11b96510b964fed09621c400491f757b4d64937a9
SHA256bac620505af8ea3facbecd137d894b8967948b8821397b3763f234c4247f9a12
SHA512e957fdcd9b9379df1f9bf6267301a3eb81b8cf220d5fd2dfb1bbab58feed09f9d5a8b684e1d501ef5bb20eccda1b69df4bcf685ba1b3ca71d9b1eb876426bbd7
-
Filesize
4KB
MD5077ab09ff5d366d68cc26082a5e4ff70
SHA1d7c3340d2985ced4dd46f93584e6a7ea3ae7ed67
SHA2568af74f03aed28e711b72cac466578d585ea467fb59cfc838e625e294880ca884
SHA51245cf9a3b64d0a0fbd171e9431d7f6ae1d9d2e0657c9dd39d49fa351957b07f69a8c4d0d155c0be73e28838e0dcadd2784c307ad9bcfb7d6be1a3ce1abb499619
-
Filesize
6KB
MD518145ca52f059d72b3161ef4ec962c2f
SHA113c3206951e6e46bc6fbdff5078cde2d552fb5dd
SHA25616db90bb3d52a6a8939b9b5fadcba22892764ca7a8cc461bfc7b85b2d56eabb3
SHA5125fd54634a284210f2f49106085e580d40bed4defbaa15a445d269b4d0b4ff91e833c30797b209d14ed18612d34336d2fd018fc2274252162cfbc54796de72c82
-
Filesize
5KB
MD5140eaa243a0fa148c5693dd527091f1d
SHA1cdd4331af9ff0c65acd941bdb0e6590a65e8b4d9
SHA256ffe3fcca2039c890d7dd39529beb08b74c7f6aab754e70b738a83b9173227e5d
SHA512fb2bc433ff84d53765f13ba8236cc0471d6e687797fd9c18c58aff7d08f00fdadc6d1d1c72c7d5d94e666a98090e22a855179e6124f6c09e15841c742c8ab7c5
-
Filesize
6KB
MD51d090a5b54341cc37ec1d11dd2269646
SHA1f0a89c63e1344cfb4cc2ea799e83b3a2fc0f3c18
SHA256baca57cf436a48bf34f1ee9bf2286d36ba80a9825dd57302038963996ab23fb9
SHA512eea5c0f6e35ff6a4db242914e2e891884cdb4896ec6aa32c7d225d3af9793ee111416672cdf91c636a77e0057dc0f761d8c9209700129cc97edd8b1286831355
-
Filesize
7KB
MD5086417f8fc0634d125b69b32b5f8bd75
SHA1c514d99cb9bfeb88c14ec8673d854393e8b3e023
SHA256d69c96d7d332d07451d0b4756e19dba1d3f81bed802e39927a5ee7e808127c98
SHA512dfbf67926bab09f7de66e9a4b3766d3bc1cf506b119a055c97e111e3bf2a27fbe1c216df08aa2caa001124f07b37d63c4b5b7018989e4257a1e5cb49f688d92f
-
Filesize
6KB
MD5bf37244812a8009a8ae28ca6b0f458d5
SHA1fb97014d29d79232b6cfc6d132c3463711f3fb85
SHA2560fcd8fdecc2bd1c125cb6e09eafbcf19ac6b0295a1cbadac2adcf65576252b4e
SHA512ee9b0b9ac0eb4b8aab70b70399bcad308ca79f486901323e45573d577874ee975e5d34df3856cfb704c258ffd5eb27707b7cc5056090e38a02d58676d53a5a62
-
Filesize
1KB
MD5638686e3ed70b9b03e2d11803e83c747
SHA1e66a95211325c004d79e9fd8ec009b4974f56e1a
SHA256d29f262f160602ce0f4c60e9bd81aa3173864add59c2e4352a1af8bc17c20baf
SHA5122aed97e0908ce52a36abc469a160a47b9999559cf9caab485cbd8a1450fe6b66e5c70f03b11514b5651a7f90cd1bc0e3b43e34204bebf63153bfd38e492c4e9b
-
Filesize
1KB
MD5f6f4e4e55b52a960589ad60e57ae2471
SHA115e99f69e7e3f8398ba72c8776351a3ebef59b6f
SHA2565e1838426234cdca59d6322db0f1bc2cb9872795f84d0c7cbc4b2e7964e802f9
SHA51271bdae2b00c4f9eb9f55ec7222437ebba1eb108d3d2faf3deecfa1a924a12210d4be22f30970d645df5dc5e0c4d69a9b71dbc5ad7faad1c0c0f3b43d87da578b
-
Filesize
1KB
MD5632f6b76c4bb72e0284e04bc559b61a0
SHA1c0a3b8db242ab9810e23e0d2fe2c004393b32e25
SHA256f2ec4e0cf418a6e740a40972de001d0754dbbd96bde1297a3f311b0a53d3220c
SHA5126d6f73df6044518ced9bd4df161716468196ffebfd666f256f47d0eda3d3787d4ae2ea45cbe26e538d99c8269608c37e14f47e59efd6b9137765e0f74f11ce83
-
Filesize
1KB
MD5ceda9ddff11235698fdca99dae05de58
SHA1b913ed82c3a1936ebd74333e03061f4c5b526913
SHA256ae39b120852b2fdbcf37c261e03b9f1e6d15c6a3affbc11b6bcd5d7aff29623e
SHA512110408a80081ff547253ec3a4dc890cebb882dac166cdeda03abbadd1319c6dbb0929fde75a28e67394fe2ea2c611f08c6c17e77d1be588f75cb439dae482cd1
-
Filesize
1KB
MD5049ed6e5d6572679f8a7677c0e24a4d7
SHA16ed59e895d00446c00af1acd8ed89eafb92338f6
SHA25670e9b693db18d226354bcac0e7bf8db8d3eb478b466723b9d87cefbdb4ae473b
SHA51255689a4c05e907c8716528fbf6fbbd51288c064b6b842802e679fbefe66a45c0c59147cd6cc5fc7b62c56326e08c36f214f50499f9da517933830e34c5902e68
-
Filesize
1KB
MD5ac9476954be7a4d5a6a3516b66c358ad
SHA17ad36a72051e88579c1b0e97013e2caff08b793b
SHA2567a901d6fc20b516f19457fc554d6e023b1e49718b35c64fd42d8cbd3415d5ad6
SHA512ea2b9791d53696c6a6967e651335c4430816f80f3fb37483f956c33f788f34e4151a8061e8d9e2e79f5310e07d18412721cd20572270b9a1bcb12e45c26296ca
-
Filesize
1KB
MD53df91d4b12227179d29d430f4de0714e
SHA1bc5c8ff0de81fd2b932f09aa200dce92c0652060
SHA256584dbb74eb661013143f213dbaeab6461f49bc2e112891be260bf2e923f5874e
SHA512b987dc6d99910ebcad4d6a368acb6d2691176ddfd3755fa32c323196ffdf2ad1b643ce541cfd28da1fe51cf4d349735e327e913bf06b85a520e841e1233b82ea
-
Filesize
1KB
MD5550f71e3ce5fff0d0abe64f0ba058d8e
SHA18c5451f50c7e8db42517c969fe2daf01b52f509d
SHA256e72696a6cb5f3867839aef535ca7503a71589770bad7068c44c90df5ec583bf1
SHA512c929519973460b4589828b0e59f4336d5408bc4d2e5b35c4ee588c291efc51d64a7eb6e239bb003486f3221b091475dbd404bef3d4a23be6c43e58632e9c1825
-
Filesize
1KB
MD5e28d05510a15079cacf5e4f0a851dbfc
SHA1d950727dc05a988b849e3ad1c72999698e45b6b1
SHA256edddad56b1ca1b6632b36481ad7804e7d524acb0a1e4bed7a21238c4a8d6b696
SHA512b8e96733dd267136c31139cab9ad06af138cc47154b9fbe052262e88ddec160cb85c12703778458e1e0adb0f0d399ce8096d6a301c94b3d6e571cc9f5ebea5c5
-
Filesize
1KB
MD548b7064e70f3482501a4f53f40bad5f3
SHA13f2bc2dd25968e8eefb9e2dd5851841031509b2f
SHA256be1ad7db6dcf55d5c1f25110f4f013fe779ba343b4dd4315f2bd464d8c36c8c9
SHA5123b605f5101466f4f306ac4a4fb35e68a7db6c881ee7aff002f5c352154b79fe9b7eb0c4fccd8cdddd356f8bd9cbe7c6c936d45ba5aac1ccc737d9c5cf7dac76e
-
Filesize
1KB
MD52116496ffefc050216e722e70d46a5a7
SHA1df7e07e2f7f65396998ed64a1ca98aa34e3bcee9
SHA2563440ee889993c0ac132e241fac051aec97415bd355b79d217a68db2e47431d2f
SHA5127dea7ed360aeb5218a6e07353ef3cf1165e0e84d82e6281879e03fdea1078e9dcbd131ac50aafb0246414f9113565a44cda638b0772f38fd4d040e129b638e2e
-
Filesize
1KB
MD579392bf88e69ec99660d62aab6b6c28e
SHA121d40e424f0393358c98eefcea75433ad20d6ab7
SHA2568f179b8e26033f186250d62863a1fcb163180cc8e2551964bddd3d13ad8b746d
SHA5120f1e0d915176d843bd9ff99e53fc611366b3c427693b0327ad074be6840a77a567d5084d059133b9636691c96a29e20d9c44804262e28bc344bb16c15f643929
-
Filesize
1KB
MD54d5899c5e60141d492f50d803c872687
SHA12c1b5a56c8a137538e62d693e631915b0def4a8e
SHA2567e56eb4d33ee21295685cb420c13c05c3e1935e0d891e58cda2c74f4380b0e04
SHA51293ff28a1d4871866ef6c545cc62ea4ee6926debee34d3b0d5ec9875429b85f16498e8b7891b28fa911925712c44637f027dd223cd5be1ce90af4d7ccf00eef38
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e6e4ed10-b10f-424b-9a39-d2126bcc65ce.tmp
Filesize3KB
MD51e21aee2ff27a472661aa46c9bfa9949
SHA1c763ce05b603f1b01a668709dd7478c8431aee60
SHA256c7ed411596d29d8fc8083304d1873a3d91f714eda8b29bce2c29bb634e983ea3
SHA5120e064e1fc8c6e6025042b0e1485ab6eb09f5a638d54281359bce3a4327008e15eda8d179e69d2aad6f9a18d1591faab4baa2be4e8990ed3c582f741d90dda3f1
-
Filesize
11KB
MD5207b3fe7b3724d9b7c2221e39dc6f032
SHA1044a761d31aa54b1c7633a63c3e8570ee08451b7
SHA256ff969063277221d152d2574147c105aafa431830c602b86f19361a011fe57662
SHA512d15f448c1d620ca590ebd2348e4f966c5d15bbd9a74ccb921a2a21d52e36bad9a1e0c1ec5a759d7ca4ff423be6b87fdba088adf4031a127169bb743ee5cb4209
-
Filesize
11KB
MD5c04308df66f3d760eaf5745df287eada
SHA1ebd06e52fb5591da2899280ca03f6ead9e2935f6
SHA25624480f3908bffad168bcc45c0b4020b90d057903aa951553f2e164ded856e288
SHA5125dd180a91a80d6ce976b56556c07b8b9377de5044c65b8c53fb068c8fd13b029f3fbf35d2fc93f0e686ad6bef636c637dcad1566cfc7e95cf3908e21391ff802
-
Filesize
19.6MB
MD5de148ba4e3c67336dbee582c1b68dd70
SHA1a5e501224175765fcf1ba441b3512ebfc61589ec
SHA25616504570dcda898c8aa2e01cde8f3f262a189b9b2c5594ef260c54786afc3cdb
SHA512b1055a829119bc84b400fdc13b158115f93d2acee1b5bdd653ee867f51097326021b85cdad0e311e89125edc3dbd82cc066d08e6f7c3fc33c30b5ab511f5da83
-
Filesize
7.2MB
MD5ca63be80bc2c1e177f106015554210e5
SHA1d9a25cc5074565cd88fab3531e570155c22a8036
SHA2569dcfda29748e29e806119cb17847bb3617c188b402ed743bd16e770401f9e127
SHA512fa0dab444f5465d1af40e84f538ffd3a53cdc9954c0c4ec5f356959a9367c4a2e94e9659a6c69b600fbcf4dee916058e46defc34acb635d167a9e2689a9a4f9d