Analysis
-
max time kernel
87s -
max time network
68s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 12:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1S6poiLHdyiD4g31PK0QiSx4_8adhOXwO/view
Resource
win10v2004-20240802-en
General
-
Target
https://drive.google.com/file/d/1S6poiLHdyiD4g31PK0QiSx4_8adhOXwO/view
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
pid Process 5992 winrar-x64-701.exe 5832 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe -
Loads dropped DLL 52 IoCs
pid Process 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 7 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1302416131-1437503476-2806442725-1000\{755FD22D-BFF3-4338-B155-D1B0CF8878CD} msedge.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 370276.crdownload:SmartScreen msedge.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3672 fifixkoo nfa tool.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 112 msedge.exe 112 msedge.exe 5292 identity_helper.exe 5292 identity_helper.exe 6068 msedge.exe 6068 msedge.exe 5424 msedge.exe 5424 msedge.exe 5528 msedge.exe 5528 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3672 fifixkoo nfa tool.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 6088 7zG.exe Token: 35 6088 7zG.exe Token: SeSecurityPrivilege 6088 7zG.exe Token: SeSecurityPrivilege 6088 7zG.exe Token: SeDebugPrivilege 3672 fifixkoo nfa tool.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe 112 msedge.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5992 winrar-x64-701.exe 5992 winrar-x64-701.exe 5992 winrar-x64-701.exe 5832 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe 3672 fifixkoo nfa tool.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 112 wrote to memory of 832 112 msedge.exe 83 PID 112 wrote to memory of 832 112 msedge.exe 83 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 4788 112 msedge.exe 84 PID 112 wrote to memory of 1804 112 msedge.exe 85 PID 112 wrote to memory of 1804 112 msedge.exe 85 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86 PID 112 wrote to memory of 4628 112 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1S6poiLHdyiD4g31PK0QiSx4_8adhOXwO/view1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb579346f8,0x7ffb57934708,0x7ffb579347182⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:82⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:5824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5432 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:12⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:12⤵PID:6048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1864,17007589240403137333,7978318887888454963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5528
-
-
C:\Users\Admin\Downloads\winrar-x64-701.exe"C:\Users\Admin\Downloads\winrar-x64-701.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5992
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2356
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5444
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\bd19a3dff9dd4cbbb35913ab4ec69478 /t 5536 /p 59921⤵PID:6008
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap6744:96:7zEvent139311⤵
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
C:\Users\Admin\Downloads\fifixkoo nfa tool.exe"C:\Users\Admin\Downloads\fifixkoo nfa tool.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5832 -
C:\Users\Admin\Downloads\fifixkoo nfa tool.exe"C:\Users\Admin\Downloads\fifixkoo nfa tool.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD54d5964edfb034da0306ef5225fe40c17
SHA1ef8e8c629117467b8758a55b49eac025fb5c5978
SHA256a7b0f4eff019d7936ad7f9f50b5bcbb87add53b5c47178c94dc376e979c486b0
SHA512a829141a92c9104489f93443d6dfae0ba8ec72bf4d46568d3f43993cf93e97e00bece62f429bfed19222e69cd968b25fa2ebd7dd85bcc6bc64575cf95567db6c
-
Filesize
3KB
MD544ed8d121062ebd842c72b2075eb681c
SHA102a069ee3aa95733926396fc2628f2f093bd4797
SHA256cc021e08a06110240209ee11aa7d633da30c1f9d83727c81aeaa4935bb58253c
SHA512d0cc9867b6a3b15d50ccf853225310a421fa55926be75619465f773c3ce2b7a045a557a5025f6802ed3de418472eb9e0e60f69a8d4dfedaf488f852f4f3b800b
-
Filesize
5KB
MD5cd9e0325f1467663f221d266bb7501ec
SHA1140acac973e2b3d82d5925f82b0c1346251601ed
SHA2560d63313ac80ad99f15561ac1f13283c2e01b5a6f11221458a76ae21a0ab4e0d6
SHA512d54c183d2619aa85ced46c99da9c9efece7763bc77378f75add450a0e5ff3e5a7222ecea77260bf31317608e8b629d5588a6ebe5bfa8374bbeaa5d94a4bcbc60
-
Filesize
7KB
MD51749f693267bf2e44dfc7a5abcfa2bcf
SHA184d7f3f00fabc148f7c46b99d21254324909114d
SHA2566829f9449ffdd7c292ece22cf05cd6d945883bccfb9ec14d1aef802887e60ea0
SHA5125de6e9431bfddd5e3791a28149eb09ac25648d4d099230aacfb9a0fa361cc87c2f4a7e4af8a3f7161bd7d4c2d29884b667a8bce562592ddf944cdb1f780255e4
-
Filesize
7KB
MD5118da55c8a838bd60016e0f2962d32d7
SHA1d72536109cbb3c5fbc5fcaf099ee9ba859487e94
SHA25671ec7f7492bd229456c07467f6498c9468a5f84d4e652c3322bebc828531b51b
SHA5124fa9489a190a1d8fcaa56168c55aa34b48167499991ed1394339fbcf843ae200eba4361b0766f4657bc6b5fa4dcc2678be5ae0d8357dbf7b09ab88b8904c01c4
-
Filesize
7KB
MD5ebec2b27d2afac38b9afe9b5fbee6c71
SHA19a21e40c8644ca397213ec6d23b95ed999ff7e45
SHA256645526a529580fe241328d6c60b3df17d6565a647de628b77d9921bb0ff971cf
SHA5121159d7f480cf84c8c07fe4f837f89adccb6b2d628c84b9b006f6851fc51635c17c6db58e70250d6eb313b87c552e059c95130ddf4ef2fdfc1a3f2eecd1d7a5db
-
Filesize
6KB
MD57e584cbeefbc72cb81df00ab76bdf25c
SHA1830a46a590326ebcd76b281bf040545ce470b54f
SHA2564f3a31a527263189c836f7780553276ff054a7975c0a8eeb6002530465ccac7a
SHA51276de6585be02fc98590967d9a0bddb4a0ffb599723a90bcb63301316cf0f2e2cd8bf6f43d6b285d551c9f424992fb9a21eaac93a6112726e1244c33b1ec00f7d
-
Filesize
1KB
MD51a0df233669ac0725266231363faea5d
SHA1039d7769b62df7a83b39b494d059de1891170ea3
SHA256b6051cd855b4b09e9c0cd852b5999def52d94c87baddab9713dd1d1c33cc45ae
SHA5124b4aa4eec7e4fff1020986df699b1607c4216e0e2786203b71dbec8c90a9e48acea90c27b61f5a39c308fbb9086d0d3745f611b85f18feba436af92613a6391a
-
Filesize
1KB
MD5931f924b097908b0140f96ae28056a7d
SHA11070d0dfe3494ec37045168e332d8c955fe76416
SHA256a2abc15c24e7477bea46b0206e466c5585fa574e978f49454a3a68dd4af18ee1
SHA5121e9a34e586fdc835fe3188ca8b8f602855da10ea0f8b1c203319ce2bc265cc5d923b7c8942ee3cc322f3b0d5dbcf0cd6e93bcacab7969d3bd1cddefe4acf6207
-
Filesize
1KB
MD5789dcb2c0d334da7f90acc8d9bca3b86
SHA1f1efc8487ba0eda151ae998e27a55021c1204297
SHA256e835f9ce0d728139f9af5cc9e56c2f0bd819e6b5605102f89451e313a7d2253c
SHA51238c07b3517ff3cb5767c68ea2ea15d9889a7f038d4bcc3a6344ec4b01f25b499f1418d472c46211026ed7135697ac95c556f466dff0ab5c513e78c470c1b6274
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5fbad05a53aa826cd9a3e022694393786
SHA119e9479555ae2dc3419b8b77e41e70cf35f356aa
SHA256574d4b52c1662a4f1b391e475f3cd6579af9fab9b48c29f15f1ccda1dd366f71
SHA512cd9ffc80790695e4c99f2399b04701224350d4d6e39bf4fa7e1fe9294dd0d1923e7535edb43f147f957aec5e76cf1927b64f3ff87f1f3bd5ab2c2dc3de5e2427
-
Filesize
11KB
MD5c2d9eef5402a9f8c5b06f1dc280536bb
SHA1757c4725840d885cb5827e7191c0372817a2560e
SHA256f21a3e3ebf9ecbc242ea4ca4d418850897555da61330013420ed8c3bb49c13aa
SHA5120ddf8de21ddfd8f391b4f9b40c1e2147b775c7c50a8f44109b3ab2c0d6f84026a12f0abfd002b831ad8520c5bf43163a44d24dba18b038af3c60c755da8ee600
-
Filesize
11KB
MD5bdacfbfcc7a1d6e0a949117cc6962c83
SHA16292bfa0fc6e1cff97be1bf1b663796d166e522b
SHA256653db1815be184859d1a3293902bc3cd18089e6d7f35fc18f027a5d01857547c
SHA51252199a543c09980b06443445a31ab1c1e39569bb9754bb414ff54ebcb329b2e31b5118f41bf45c4dba6585a7c25009f97313daa0e9f18db5790afe00fb9de603
-
Filesize
576KB
MD501b946a2edc5cc166de018dbb754b69c
SHA1dbe09b7b9ab2d1a61ef63395111d2eb9b04f0a46
SHA25688f55d86b50b0a7e55e71ad2d8f7552146ba26e927230daf2e26ad3a971973c5
SHA51265dc3f32faf30e62dfdecb72775df870af4c3a32a0bf576ed1aaae4b16ac6897b62b19e01dc2bf46f46fbe3f475c061f79cbe987eda583fee1817070779860e5
-
Filesize
30KB
MD50fe6d52eb94c848fe258dc0ec9ff4c11
SHA195cc74c64ab80785f3893d61a73b8a958d24da29
SHA256446c48c1224c289bd3080087fe15d6759416d64f4136addf30086abd5415d83f
SHA512c39a134210e314627b0f2072f4ffc9b2ce060d44d3365d11d8c1fe908b3b9403ebdd6f33e67d556bd052338d0ed3d5f16b54d628e8290fd3a155f55d36019a86
-
Filesize
5.7MB
MD5817520432a42efa345b2d97f5c24510e
SHA1fea7b9c61569d7e76af5effd726b7ff6147961e5
SHA2568d2ff4ce9096ddccc4f4cd62c2e41fc854cfd1b0d6e8d296645a7f5fd4ae565a
SHA5128673b26ec5421fce8e23adf720de5690673bb4ce6116cb44ebcc61bbbef12c0ad286dfd675edbed5d8d000efd7609c81aae4533180cf4ec9cd5316e7028f7441
-
Filesize
43KB
MD56bc084255a5e9eb8df2bcd75b4cd0777
SHA1cf071ad4e512cd934028f005cabe06384a3954b6
SHA2561f0f5f2ce671e0f68cf96176721df0e5e6f527c8ca9cfa98aa875b5a3816d460
SHA512b822538494d13bda947655af791fed4daa811f20c4b63a45246c8f3befa3ec37ff1aa79246c89174fe35d76ffb636fa228afa4bda0bd6d2c41d01228b151fd89
-
Filesize
16B
MD5bcebcf42735c6849bdecbb77451021dd
SHA14884fd9af6890647b7af1aefa57f38cca49ad899
SHA2569959b510b15d18937848ad13007e30459d2e993c67e564badbfc18f935695c85
SHA512f951b511ffb1a6b94b1bcae9df26b41b2ff829560583d7c83e70279d1b5304bde299b3679d863cad6bb79d0beda524fc195b7f054ecf11d2090037526b451b78
-
Filesize
2.4MB
MD5678fa1496ffdea3a530fa146dedcdbcc
SHA1c80d8f1de8ae06ecf5750c83d879d2dcc2d6a4f8
SHA256d6e45fd8c3b3f93f52c4d1b6f9e3ee220454a73f80f65f3d70504bd55415ea37
SHA5128d9e3fa49fb42f844d8df241786ea9c0f55e546d373ff07e8c89aac4f3027c62ec1bd0c9c639afeabc034cc39e424b21da55a1609c9f95397a66d5f0d834e88e
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
83KB
MD5223fd6748cae86e8c2d5618085c768ac
SHA1dcb589f2265728fe97156814cbe6ff3303cd05d3
SHA256f81dc49eac5ecc528e628175add2ff6bda695a93ea76671d7187155aa6326abb
SHA5129c22c178417b82e68f71e5b7fe7c0c0a77184ee12bd0dc049373eace7fa66c89458164d124a9167ae760ff9d384b78ca91001e5c151a51ad80c824066b8ecce6
-
Filesize
122KB
MD5bbd5533fc875a4a075097a7c6aba865e
SHA1ab91e62c6d02d211a1c0683cb6c5b0bdd17cbf00
SHA256be9828a877e412b48d75addc4553d2d2a60ae762a3551f9731b50cae7d65b570
SHA51223ef351941f459dee7ed2cebbae21969e97b61c0d877cfe15e401c36369d2a2491ca886be789b1a0c5066d6a8835fd06db28b5b28fb6e9df84c2d0b0d8e9850e
-
Filesize
245KB
MD53055edf761508190b576e9bf904003aa
SHA1f0dc8d882b5cd7955cc6dfc8f9834f70a83c7890
SHA256e4104e47399d3f635a14d649f61250e9fd37f7e65c81ffe11f099923f8532577
SHA51287538fe20bd2c1150a8fefd0478ffd32e2a9c59d22290464bf5dfb917f6ac7ec874f8b1c70d643a4dc3dd32cbe17e7ea40c0be3ea9dd07039d94ab316f752248
-
Filesize
64KB
MD5eedb6d834d96a3dffffb1f65b5f7e5be
SHA1ed6735cfdd0d1ec21c7568a9923eb377e54b308d
SHA25679c4cde23397b9a35b54a3c2298b3c7a844454f4387cb0693f15e4facd227dd2
SHA512527bd7bb2f4031416762595f4ce24cbc6254a50eaf2cc160b930950c4f2b3f5e245a486972148c535f8cd80c78ec6fa8c9a062085d60db8f23d4b21e8ae4c0ad
-
Filesize
156KB
MD505e8b2c429aff98b3ae6adc842fb56a3
SHA1834ddbced68db4fe17c283ab63b2faa2e4163824
SHA256a6e2a5bb7a33ad9054f178786a031a46ea560faeef1fb96259331500aae9154c
SHA512badeb99795b89bc7c1f0c36becc7a0b2ce99ecfd6f6bb493bda24b8e57e6712e23f4c509c96a28bc05200910beddc9f1536416bbc922331cae698e813cbb50b3
-
Filesize
31KB
MD56e0cb85dc94e351474d7625f63e49b22
SHA166737402f76862eb2278e822b94e0d12dcb063c5
SHA2563f57f29abd86d4dc8f4ca6c3f190ebb57d429143d98f0636ff5117e08ed81f9b
SHA5121984b2fc7f9bbdf5ba66716fc60dcfd237f38e2680f2fc61f141ff7e865c0dbdd7cdc47b3bc490b426c6cfe9f3f9e340963abf428ea79eb794b0be7d13001f6a
-
Filesize
81KB
MD5dc06f8d5508be059eae9e29d5ba7e9ec
SHA1d666c88979075d3b0c6fd3be7c595e83e0cb4e82
SHA2567daff6aa3851a913ed97995702a5dfb8a27cb7cf00fb496597be777228d7564a
SHA51257eb36bc1e9be20c85c34b0a535b2349cb13405d60e752016e23603c4648939f1150e4dbebc01ec7b43eb1a6947c182ccb8a806e7e72167ad2e9d98d1fd94ab3
-
Filesize
174KB
MD55b9b3f978d07e5a9d701f832463fc29d
SHA10fcd7342772ad0797c9cb891bf17e6a10c2b155b
SHA256d568b3c99bf0fc35a1f3c5f66b4a9d3b67e23a1d3cf0a4d30499d924d805f5aa
SHA512e4db56c8e0e9ba0db7004463bf30364a4e4ab0b545fb09f40d2dba67b79b6b1c1db07df1f017501e074abd454d1e37a4167f29e7bbb0d4f8958fa0a2e9f4e405
-
Filesize
35KB
MD57ec3fc12c75268972078b1c50c133e9b
SHA173f9cf237fe773178a997ad8ec6cd3ac0757c71e
SHA2561a105311a5ed88a31472b141b4b6daa388a1cd359fe705d9a7a4aba793c5749f
SHA512441f18e8ce07498bc65575e1ae86c1636e1ceb126af937e2547710131376be7b4cb0792403409a81b5c6d897b239f26ec9f36388069e324249778a052746795e
-
Filesize
1.3MB
MD508332a62eb782d03b959ba64013ac5bc
SHA1b70b6ae91f1bded398ca3f62e883ae75e9966041
SHA2568584f0eb44456a275e3bc69626e3acad595546fd78de21a946b2eb7d6ba02288
SHA512a58e4a096d3ce738f6f93477c9a73ddbfcb4b82d212c0a19c0cf9e07f1e62b2f477a5dd468cd31cc5a13a73b93fa17f64d6b516afef2c56d38ede1ace35cf087
-
Filesize
5.0MB
MD5e547cf6d296a88f5b1c352c116df7c0c
SHA1cafa14e0367f7c13ad140fd556f10f320a039783
SHA25605fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA5129f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d
-
Filesize
38KB
MD50f8e4992ca92baaf54cc0b43aaccce21
SHA1c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA5126e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978
-
Filesize
768KB
MD519a2aba25456181d5fb572d88ac0e73e
SHA1656ca8cdfc9c3a6379536e2027e93408851483db
SHA2562e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337
-
Filesize
66KB
MD579b02450d6ca4852165036c8d4eaed1f
SHA1ce9ff1b302426d4c94a2d3ea81531d3cb9e583e4
SHA256d2e348e615a5d3b08b0bac29b91f79b32f0c1d0be48976450042462466b51123
SHA51247044d18db3a4dd58a93b43034f4fafa66821d157dcfefb85fca2122795f4591dc69a82eb2e0ebd9183075184368850e4caf9c9fea0cfe6f766c73a60ffdf416
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
Filesize
29KB
MD592b440ca45447ec33e884752e4c65b07
SHA15477e21bb511cc33c988140521a4f8c11a427bcc
SHA256680df34fb908c49410ac5f68a8c05d92858acd111e62d1194d15bdce520bd6c3
SHA51240e60e1d1445592c5e8eb352a4052db28b1739a29e16b884b0ba15917b058e66196988214ce473ba158704837b101a13195d5e48cb1dc2f07262dfecfe8d8191
-
Filesize
1.1MB
MD516be9a6f941f1a2cb6b5fca766309b2c
SHA117b23ae0e6a11d5b8159c748073e36a936f3316a
SHA25610ffd5207eeff5a836b330b237d766365d746c30e01abf0fd01f78548d1f1b04
SHA51264b7ecc58ae7cf128f03a0d5d5428aaa0d4ad4ae7e7d19be0ea819bbbf99503836bfe4946df8ee3ab8a92331fdd002ab9a9de5146af3e86fef789ce46810796b
-
Filesize
3.8MB
MD546c17c999744470b689331f41eab7df1
SHA1b8a63127df6a87d333061c622220d6d70ed80f7c
SHA256c5b5def1c8882b702b6b25cbd94461c737bc151366d2d9eba5006c04886bfc9a
SHA5124b02a3e85b699f62df1b4fe752c4dee08cfabc9b8bb316bc39b854bd5187fc602943a95788ec680c7d3dc2c26ad882e69c0740294bd6cb3b32cdcd165a9441b6