Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 22:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pub2.pskt.io/c/kf6mtj?data=0Fg78lTXUUpfhUmCG17NInmBEK%2FLp5XE2bYzUTslMqmb59B5DalwyGSJatWrluFJ36KwBTwwJd%2B7uTdrMOR7JBVsILX5s33k1N3MnRPGUYPyOinBbELYHrNhVewizMdjEeVIaD1JqsPSkJu6hMOOItYc4KM1h9Ddodmp1eJ%2BPFsLQfCWdK00icWXESWdmabFwKg1a54%2FgvFpIWSiToeFlmANYv8voS4dL9LDQTP5vwYrYO0WAcDZiPXVuOU%2BVbu7cJTk%2FdkVJSM%2BKso1y%2Fm2UbwmEXoSIUGFZ0VZNwl%2FsJYX7Hi0uI52JWiZtQTbDMTtLgGYVPStqAjBJ26VKpmnjp%2BONJLgJVr2Ji9E4AKsOvKNTLB313b8w4mIgsSLWFvwAD9dBsK8PiLIrZC%2Fh784RzMcCAQw8lqWnUatyQFbOAr72PZK%2FJ0YIaiWAkUSck%2BZ9yHOXaxkWJ3Yhy8xuX1VuHsi0ELXBSyKrqMxDYYsG2fEHPRXZHWxBaS89VZHWMq7D0dlwWVK%2FLz2ma32EF%2Fov4dmQvBIIM3N5e34WF5z7x2sO9gxfGZDW%2F8JN3M0BBTYgd4rT5Lhx9Xe4UN96%2FgSCa00R1GRPM0SClHfVX98pI8sPU1XKSFa4oQ1BC9FwF8ZYXdP4Zcuy8qD%2FyCFNwcnnwpbL0JbleYy%2B2VHpAyTO3IlWQwCPgr%2BLWVzeyd3fktvQK%2Bb7CLdb7%2B6PfMwVcMZueN0Ug7G8v75jKI4DvXjgL8cpzAqR%2FUMPoKP5%2BIO6rc9Kh0Yry7eX811bG7Cc9W6NA%3D%3D&iv=4824235b53b98a3ddd2cd7aab50954a2
Resource
win10v2004-20240802-en
General
-
Target
https://pub2.pskt.io/c/kf6mtj?data=0Fg78lTXUUpfhUmCG17NInmBEK%2FLp5XE2bYzUTslMqmb59B5DalwyGSJatWrluFJ36KwBTwwJd%2B7uTdrMOR7JBVsILX5s33k1N3MnRPGUYPyOinBbELYHrNhVewizMdjEeVIaD1JqsPSkJu6hMOOItYc4KM1h9Ddodmp1eJ%2BPFsLQfCWdK00icWXESWdmabFwKg1a54%2FgvFpIWSiToeFlmANYv8voS4dL9LDQTP5vwYrYO0WAcDZiPXVuOU%2BVbu7cJTk%2FdkVJSM%2BKso1y%2Fm2UbwmEXoSIUGFZ0VZNwl%2FsJYX7Hi0uI52JWiZtQTbDMTtLgGYVPStqAjBJ26VKpmnjp%2BONJLgJVr2Ji9E4AKsOvKNTLB313b8w4mIgsSLWFvwAD9dBsK8PiLIrZC%2Fh784RzMcCAQw8lqWnUatyQFbOAr72PZK%2FJ0YIaiWAkUSck%2BZ9yHOXaxkWJ3Yhy8xuX1VuHsi0ELXBSyKrqMxDYYsG2fEHPRXZHWxBaS89VZHWMq7D0dlwWVK%2FLz2ma32EF%2Fov4dmQvBIIM3N5e34WF5z7x2sO9gxfGZDW%2F8JN3M0BBTYgd4rT5Lhx9Xe4UN96%2FgSCa00R1GRPM0SClHfVX98pI8sPU1XKSFa4oQ1BC9FwF8ZYXdP4Zcuy8qD%2FyCFNwcnnwpbL0JbleYy%2B2VHpAyTO3IlWQwCPgr%2BLWVzeyd3fktvQK%2Bb7CLdb7%2B6PfMwVcMZueN0Ug7G8v75jKI4DvXjgL8cpzAqR%2FUMPoKP5%2BIO6rc9Kh0Yry7eX811bG7Cc9W6NA%3D%3D&iv=4824235b53b98a3ddd2cd7aab50954a2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2288 msedge.exe 2288 msedge.exe 4056 msedge.exe 4056 msedge.exe 2556 identity_helper.exe 2556 identity_helper.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe 5728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4056 wrote to memory of 5076 4056 msedge.exe 84 PID 4056 wrote to memory of 5076 4056 msedge.exe 84 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 3872 4056 msedge.exe 85 PID 4056 wrote to memory of 2288 4056 msedge.exe 86 PID 4056 wrote to memory of 2288 4056 msedge.exe 86 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87 PID 4056 wrote to memory of 5044 4056 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://pub2.pskt.io/c/kf6mtj?data=0Fg78lTXUUpfhUmCG17NInmBEK%2FLp5XE2bYzUTslMqmb59B5DalwyGSJatWrluFJ36KwBTwwJd%2B7uTdrMOR7JBVsILX5s33k1N3MnRPGUYPyOinBbELYHrNhVewizMdjEeVIaD1JqsPSkJu6hMOOItYc4KM1h9Ddodmp1eJ%2BPFsLQfCWdK00icWXESWdmabFwKg1a54%2FgvFpIWSiToeFlmANYv8voS4dL9LDQTP5vwYrYO0WAcDZiPXVuOU%2BVbu7cJTk%2FdkVJSM%2BKso1y%2Fm2UbwmEXoSIUGFZ0VZNwl%2FsJYX7Hi0uI52JWiZtQTbDMTtLgGYVPStqAjBJ26VKpmnjp%2BONJLgJVr2Ji9E4AKsOvKNTLB313b8w4mIgsSLWFvwAD9dBsK8PiLIrZC%2Fh784RzMcCAQw8lqWnUatyQFbOAr72PZK%2FJ0YIaiWAkUSck%2BZ9yHOXaxkWJ3Yhy8xuX1VuHsi0ELXBSyKrqMxDYYsG2fEHPRXZHWxBaS89VZHWMq7D0dlwWVK%2FLz2ma32EF%2Fov4dmQvBIIM3N5e34WF5z7x2sO9gxfGZDW%2F8JN3M0BBTYgd4rT5Lhx9Xe4UN96%2FgSCa00R1GRPM0SClHfVX98pI8sPU1XKSFa4oQ1BC9FwF8ZYXdP4Zcuy8qD%2FyCFNwcnnwpbL0JbleYy%2B2VHpAyTO3IlWQwCPgr%2BLWVzeyd3fktvQK%2Bb7CLdb7%2B6PfMwVcMZueN0Ug7G8v75jKI4DvXjgL8cpzAqR%2FUMPoKP5%2BIO6rc9Kh0Yry7eX811bG7Cc9W6NA%3D%3D&iv=4824235b53b98a3ddd2cd7aab50954a21⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd8f2946f8,0x7ffd8f294708,0x7ffd8f2947182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3396 /prefetch:82⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:12⤵PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:12⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1268 /prefetch:12⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,11455000292216898570,7878423482269516182,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize192B
MD5efce107d3597455fdb2b4838f01d562a
SHA1bcb6762ccac541f0a9bdffdebe001a968f95f99e
SHA256c2181beb2a6abbd1b76ece359a7989f5a1460233e27862c0dd7d4bd7cfbe7a47
SHA5129f0801ff16e8bc1284ff29939a9546902411da1a5664fe2fa051017abe0a618b0cbfc4666daaa12d9245eadf3c5ea132e7b4224fa78965e3b6815e2eb6a3d05f
-
Filesize
1KB
MD5e1154f56b99024bf08a40d6085bb1259
SHA1cf27de64c81026c947359a152f0392662dbe944b
SHA256ebaf49850cc187add4b74460071d271f9828afa78af579c2cb00541765936948
SHA51246ff9285f26269fbf4730bb8713fc70408e1e8fd917034c7ea2c80f5b53abd50db1842ce0502d45d86302319b1a4b6190829ea857a933b47490017dd1ccd41a8
-
Filesize
6KB
MD5a0dfcdda37dbec08a1d213ea2edabab8
SHA1786c96596d526578eee3e1c5d2d9594df6cac42b
SHA256c910772a8522c25e1de30ffc95da721590b37f77748a11e1eda40ad082c35aca
SHA5120afb65f7a40ae7f5162f2a263ae354154086a8974787023b50b1cb8e6271bf31e4318d7790a1aa605dc5840911ab86f63547c5e236d71260378289a857493612
-
Filesize
5KB
MD51a235133adaa7dba3e31abc0466965b9
SHA122e470d29e8cb91e8bf223963d7f1569af662ed4
SHA2566559de1fbf03bf3c5657449d2c73cac5c2dbf1447a5708700b571219807377cf
SHA512c9fe815dc5cb834a1bb7fdf6632810750074e8cbe325f2fb48b09c4db95245c76ed148b9cbf3c711715f990287d023db2da15e5cdfc04fab9ab2236a4e9ecbb1
-
Filesize
6KB
MD5b1c1c2ddf07929f1369d1502a8edbcac
SHA154b1b645a00cdedb69d735887aebc5e2c71fc4f9
SHA2567f932d800d1869a53f515fdc62516af807e900eb90eac7dd86c8a95270c61f37
SHA5126eb920a5750dd7d06b1c76d7d84468453c30368d97cb37129df52cd6077f55d883acd68d96b1233021cb0a70bf33ce8cc22461309632b36ecc0a7c4a14018fa6
-
Filesize
6KB
MD530cb66cdb1cb69532b5a004872ab6367
SHA19256ddccc7c0a58142dc42de60418f5d784f2b52
SHA2566940241a2509369298bdb9f104e357e0c13aa00321384f277201d1a6fcde4e89
SHA51285548a21824ee2294f26bf1f1e3d8bcc2c0c4aee689e71cf10ec20fc229cc90e3f6bf8fab34bfe306e3519cade424a6274ca174253e2b5382680557c9743e09b
-
Filesize
705B
MD513443124f57da973edb6f69d7e85bb71
SHA1fb9ef2b9cf14283ef075c77953ec48c43e4b63c7
SHA256fca4c09e58a793e0e1b92ac13fb7689ec2b5baa9359959f7fc69ac7e0f1f8b90
SHA512c044a0fcfcecde7ecf902330a34bc36055dc8950d166dd7baa1082e3c873c6fb36ac8305ff1f5e3e9e176b04d11aa97d549963dfc0631d573b707ce998111c26
-
Filesize
705B
MD5c2c96b030ceeff444e2be931147135c9
SHA133db2f85fdc34c07f9d03efdbb46b40b4ba0cbb9
SHA256c9f8a137dac3bf1ccbf3200144f632b91a1dd9aba924443605800196ff34686b
SHA5129d161b640d288592f63f9c8aa1b99acb726e722943ca7332662ac5f3769423d11846d5b701ecd75c606957b0981f1aade23e5e704eaea9098255928568a79d63
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58146bcaadc2512898f888544cca98f6f
SHA1ce721a5075822b21fc980af6af9e63e0c0f6ed08
SHA256aca91b51365b0b11e9c4d50a5473cdecbb331220db82036375fa23f813a9b69b
SHA512c35000b4240eefb0af31a499004b33c13363f12855fdc026f461fbf30419f77ccfc7ce5c9fae86e9f696f8bfadea3c5da7488fe6b7e684aa5470f8d1faa89207