Analysis
-
max time kernel
439s -
max time network
443s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
SpooferDriverMethod/rgoikhoihoiherth.sys
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
SpooferDriverMethod/strnmap.exe
Resource
win10v2004-20240802-en
General
-
Target
SpooferDriverMethod/rgoikhoihoiherth.sys
-
Size
14KB
-
MD5
705a2a2e128085dde22d0037b63ac1cd
-
SHA1
1dc83b46141de57de725862c0a1bec81296c6fb5
-
SHA256
57c0c063e61e9f957c06f38aee0d99aa779dec9768f4ab77fbfe67de056ddeb2
-
SHA512
6c483880ec3b98ff8d6d9213ccd8a1add5b85973e301496e35d6ca2785479aaca3a8e5e56d87d9967140a60b2248a8b83df089e165b807deb86e13a252a189ba
-
SSDEEP
192:GDPv72sYIYdRPO/1IZrGsDeaCYcH6B1wg/KuExx6PpPIKfhignDiG1g2MvqTEeTT:GLPYBQIRNDRC5Tggx4pwKThECTEqsC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5640 strnmap.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-656926755-4116854191-210765258-1000\{D9C0D8E8-0405-4BD9-856C-A0C96B83E75A} msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1092 msedge.exe 1092 msedge.exe 1064 identity_helper.exe 1064 identity_helper.exe 3404 msedge.exe 3404 msedge.exe 5556 msedge.exe 5556 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe 3388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2308 7zG.exe Token: 35 2308 7zG.exe Token: SeSecurityPrivilege 2308 7zG.exe Token: SeSecurityPrivilege 2308 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 2308 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 3052 1092 msedge.exe 105 PID 1092 wrote to memory of 3052 1092 msedge.exe 105 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 3928 1092 msedge.exe 106 PID 1092 wrote to memory of 1832 1092 msedge.exe 107 PID 1092 wrote to memory of 1832 1092 msedge.exe 107 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108 PID 1092 wrote to memory of 1944 1092 msedge.exe 108
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SpooferDriverMethod\rgoikhoihoiherth.sys1⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\SpooferDriverMethod\rgoikhoihoiherth.sysC:\Users\Admin\AppData\Local\Temp\SpooferDriverMethod\rgoikhoihoiherth.sys2⤵PID:2424
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fffd55046f8,0x7fffd5504708,0x7fffd55047182⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3672 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:5808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:6072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:5228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6288 /prefetch:12⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6440 /prefetch:82⤵PID:5580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6432 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14357123297656577118,14254249625170256246,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6456 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\SpooferDriverTemp\" -ad -an -ai#7zMap29083:96:7zEvent224091⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2308
-
C:\Users\Admin\Downloads\SpooferDriverTemp\SpooferDriverMethod\strnmap.exe"C:\Users\Admin\Downloads\SpooferDriverTemp\SpooferDriverMethod\strnmap.exe" C:\Users\Admin\Downloads\SpooferDriverTemp\SpooferDriverMethod\rgoikhoihoiherth.sys1⤵
- Executes dropped EXE
PID:5640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5ec7b7c81049b2d2a5604d8870b413c5a
SHA105c7ef326e9db8c53d5e74bfcff69d333c761978
SHA2565837a5870b4dbd97e364327d833c3916041de6073cdf059f48ded735336762fa
SHA512cc6c361ef1b33fab1f0b1291144d3b5c5d456fb8a838d9f706437c6189939f8fb72d118282c2399b33f8b8714432de13d986734cdbc4f8a15fd03150873e2073
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize288B
MD5fc37fc8d7c718017da8c93e7eb156e75
SHA1e46f66872f241ada4b231bbeaaaa1336f6ddffea
SHA2561cbe577240d7a5de3e2209f58647ef6fae21496f304894facb94ea69e44ba482
SHA5129a98fc6121af66f7b5fef5f997330a240111b137b2053f89de2712b2e6edbf689b542e30c085142e3a034af8efbd33d2213e1b2091f871248719390ac9ee090e
-
Filesize
461B
MD5265657b0146900b801d0b5dfbae54841
SHA13526dae647fc8183c3a37abf8adab8e388b44829
SHA256a7cf2c705f068be9274168d53b9c930683d5bb9e2036f5da894175059af175d3
SHA5128cd9028b7bfbb3498c545c877aeef434012ff243b75f791adb2b7deb72b5ec74e632e16588d8295f368d1d7158428ac2b420418c76adf18bc4518dfa91f7dbfb
-
Filesize
1018B
MD5e2a763d2bf92249de3c0b53e5475ea4e
SHA135c1be7e11f11d2da62711292bd55aea14df41db
SHA25637a87804e50b59fe3aec2af9a0f9907f0d43cdaab765113716cc81059e9e4f02
SHA512d7eb0345b9474723781725364d08b38fb6fc4faa1806a1bee8bd5b74dfdc6fa749ba63662a4a3ecbd2103f83fd569df1915c31969f9eb365634bb5af03994ff5
-
Filesize
5KB
MD5577025e465d77a87f2be25273a759198
SHA190aa20bc814402d1a4f8f6dd91d5a6892a68cf21
SHA256d9c79bb42ab789d920016318c7d9c336d7f80ee1d0531d416308a8b51db72e94
SHA512c8bda5ff62469017732b1b026c304f70687ce70f5b4f55aa64786f36b560ec0aa76724caceffe0579e21368ebcd2c81c4c95eb0a6543367516e431e620ca31b2
-
Filesize
6KB
MD5abbccc77c9fc4b9f0b5c4a8acd8941ec
SHA1c87d17799c36e5f88bd5c0825f4ad6fd3adfacc0
SHA2560a3a8d2f8a1a60299e2bf9a52b7bca0c88122145675cc0e14a8cf07644bc48f8
SHA51232babbb59a5bba1f2b11ddcd7f6e849596db4fab8734ae27be51d4dc6ed9881e768dc78ebc807b5ed71a9fc0251e4220b69ddbdc77d1589d2333b8ac3b502b50
-
Filesize
6KB
MD55bcfcffc0058a5b3cfea6b3905aa7574
SHA1221fd66b11c4a6e15848213c9ac94f24eea922e8
SHA25650bde63d36e45c5e4d45e5f1a83e74b2d0cbcd1ecb854f9f072a006d1bd055bd
SHA51253df68892dc89905d06e51e3323bb44ba016adcb36dcfef594dd89797e0f89ee4f23db3acc3e17f1a9e09906911227c68e17b8312ea8f3e10f1812bea32d552d
-
Filesize
7KB
MD5f086a621bdf9aeac02a41e28d2b7b7a7
SHA16485e925de17cdfdecf9922c98a38d500abf6ab0
SHA2561a5790adc1683914803756a60e95a6fe2323d7c64404b91b0cfc35bd91073566
SHA512ad6808a81614f6554d5c6ed70476de515be2cf40eed46ac55b700a8eb49d6f5cfaf90041b69a73f50d24a428c33cbc8465d9fc47a0fea4a3e2f974adaa3c59af
-
Filesize
7KB
MD51337d900935ca6b13e7f1f7115467f3a
SHA19d04797715cc85596453603c7c6924465dd9ee5c
SHA256d522f2cd3dc535f4adf5a640487c2d65990738e6df0526070bcf3c6310f586d9
SHA5126726e0678e05ad4994b9544f89a2ca9398345637dd9c49f61aaf9f2b4d5e8d1dc5b6a571f52ab6243d02406f2622bb37c487823bbb24fc6073f3076957ec8e96
-
Filesize
1KB
MD522fc25b1353f5d9975f39f9f14f1511a
SHA1325bf34df7ccaee5f79e4b577072ab3704831930
SHA25643bd8dea904cd227c63dc0cefd15930d2862e9330a4fa630df2b9d0230bb62a5
SHA5122a1102e8fc3f832a7f4919c93ab8ffe0be1c3ea546075d1ffab3718bc3b4f52b44cd764f66cd0264bc56ef32e442eddff7a1c065fb9f2195269fc5c6d70bbee2
-
Filesize
370B
MD56ad4f76b4d50d3d1f110d5752f024132
SHA177dce5633256d25e6b20e67f78e6bff27b03289d
SHA25662c048617d7c0237e8022a516caf428c0bcc32f7295e97329b7affb6b1427204
SHA512261a11c7253b2585b6b92b311d23d73126f32b6a79d88a3e6ff50a0bca8a7eee29f8a0848d779fe78769edddc9c4f1c093414afd03718fdc8ea37c97c679dc14
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5caafe47f220eda72a708b1bd6e7a02ec
SHA1c7ffa96098feb279600afe963bd92428ac5cd78b
SHA2562f2b8c084b183de181d8b53757bd04c6baf98bf12cd12d5660a396094ccd8cd4
SHA51248cf74a226abbb133311dc26eeca4330bf124a3a5ecdb378f683bc7cd974eb3cb7d04fdfb5054b9fc9d346ce8a1a9aefae2bea4bceea8aff5c59a3a44c916940
-
Filesize
11KB
MD50ebc839349d9d8fb0c5c7f3eb1bb0b41
SHA116b53191da5c9b4bd42ef5ddcf614518fae69e17
SHA2566b03bec2f91b3dd0a35299255a4c9af4a637ac99aec8aa1400e90bee33b08f01
SHA512d9cf9e15e4ac1554379a7f26c96b1b71adfd34ba0555b33e14b0bfdc767c549d3a040cad6f0019940ce674ff8e1684eb160ca1d08d26e81e3396ac5904f179ec
-
Filesize
12KB
MD5b65251412bcea9bea0d76af1cfa321cb
SHA10f87cde82fabefa4f972c4d9a5a54267bda21966
SHA256629bf50286281aa29a965571ce924af9d40a4bf7dbb26d91b865c4ed04feaf3e
SHA512e518ca4bba4b96a87ab831f29c0cda60722cb1c7fedf925e0cf69deee8e06e18aa9fc2c012d7b16c29eef98506248fa6abacb963f9243ac78f0df939a18225b8
-
Filesize
111KB
MD5c96d2a67e360ea1f9aa359705bfbdbd0
SHA1ee2ed88f676b011e5c610ad9ff86274683fafd8b
SHA25672f8cec9ea30bbfca6ec09014399b7279ca0ce25ce4c40678d0ca3fe0896b3b7
SHA512248b29f267e59edfb6b8a7d9a6e7b02c53b62c2ef2de2e3682d3ad2b4dbdda3b481bcc9477d5a472bf230169bafd95c2364a089580f609418796dd876947c631
-
Filesize
530KB
MD554ed683eba9340abf6783bd8d7b39445
SHA1950e3c11c71354097c8440529b31f8ac2b3c32a8
SHA2562d0a9d5ca563ffa82a974903bb43411b22c863311ec926449f08d16f483e4e70
SHA5129ff8c110823bad1e0a79a810b151e1d5557022080af0c8aaa9ff76996bd040747346f62459c50468cf86f49389c0e5fb7f057e9bd30fa31fed49ae5692d50ae2