Overview
overview
7Static
static
374dd331228...1a.exe
windows7-x64
774dd331228...1a.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3lantern.exe
windows7-x64
1lantern.exe
windows10-2004-x64
7Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 16:07
Static task
static1
Behavioral task
behavioral1
Sample
74dd331228ae7266640da7645cf7dd68793c1f0f0f7f5231e6c82cf94038571a.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74dd331228ae7266640da7645cf7dd68793c1f0f0f7f5231e6c82cf94038571a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
lantern.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
lantern.exe
Resource
win10v2004-20240802-en
General
-
Target
lantern.exe
-
Size
39.9MB
-
MD5
16cfc3c5f541a8c84aef99a8ba8b9d9d
-
SHA1
db30b549f383e9c36fbb743db1222e3d7ccfd9f6
-
SHA256
2504fdcc39c2f1fb58ccb09a2f858322aa653ff925b6e3bd5f397f2a2daa573e
-
SHA512
9b6080b650f3afdaa88a2a3f9336b839260538cc586683e855888c474f27114c58114086c7db6a4f3cbb96ad9e6fc68540544f175a0dc8e8dd2c91bf2f986d39
-
SSDEEP
393216:fsFhr1yDc/r3q+DMsuqtuYD4fxb9H5MHfN:GhByDc/rauSXfxbU/N
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2020 sysproxy-cmd.exe 3144 sysproxy-cmd.exe 3564 sysproxy-cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lantern = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\lantern.exe\" -startup" lantern.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lantern = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\lantern.exe\" -startup" lantern.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 raw.githubusercontent.com 12 raw.githubusercontent.com -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\chrome_debug.log msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lantern.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lantern.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysproxy-cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C lantern.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lantern.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 lantern.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 4316 msedge.exe 4316 msedge.exe 1064 msedge.exe 1064 msedge.exe 5048 identity_helper.exe 5048 identity_helper.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe 2376 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3320 lantern.exe Token: SeDebugPrivilege 4452 lantern.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4452 lantern.exe 4452 lantern.exe 4452 lantern.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 4452 lantern.exe 4452 lantern.exe -
Suspicious use of SendNotifyMessage 29 IoCs
pid Process 4452 lantern.exe 4452 lantern.exe 4452 lantern.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 4452 lantern.exe 4452 lantern.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3320 wrote to memory of 888 3320 lantern.exe 87 PID 3320 wrote to memory of 888 3320 lantern.exe 87 PID 3320 wrote to memory of 888 3320 lantern.exe 87 PID 3320 wrote to memory of 4452 3320 lantern.exe 89 PID 3320 wrote to memory of 4452 3320 lantern.exe 89 PID 3320 wrote to memory of 4452 3320 lantern.exe 89 PID 4452 wrote to memory of 4924 4452 lantern.exe 90 PID 4452 wrote to memory of 4924 4452 lantern.exe 90 PID 4452 wrote to memory of 4924 4452 lantern.exe 90 PID 4452 wrote to memory of 2816 4452 lantern.exe 92 PID 4452 wrote to memory of 2816 4452 lantern.exe 92 PID 4452 wrote to memory of 2816 4452 lantern.exe 92 PID 4452 wrote to memory of 1380 4452 lantern.exe 94 PID 4452 wrote to memory of 1380 4452 lantern.exe 94 PID 1380 wrote to memory of 2948 1380 msedge.exe 95 PID 1380 wrote to memory of 2948 1380 msedge.exe 95 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 3964 1380 msedge.exe 96 PID 1380 wrote to memory of 2268 1380 msedge.exe 97 PID 1380 wrote to memory of 2268 1380 msedge.exe 97 PID 1380 wrote to memory of 3128 1380 msedge.exe 99 PID 1380 wrote to memory of 3128 1380 msedge.exe 99 PID 1380 wrote to memory of 3128 1380 msedge.exe 99 PID 1380 wrote to memory of 3128 1380 msedge.exe 99 PID 1380 wrote to memory of 3128 1380 msedge.exe 99 PID 1380 wrote to memory of 3128 1380 msedge.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\lantern.exe"C:\Users\Admin\AppData\Local\Temp\lantern.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\cmd.execmd ver2⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\lantern.exeC:\Users\Admin\AppData\Local\Temp\lantern.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.execmd ver3⤵
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\cmd.execmd ver3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --headless https://localhost:622743⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe228f46f8,0x7ffe228f4708,0x7ffe228f47184⤵PID:2948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1512,11016268087984916507,13577097613630068557,131072 --disable-features=PaintHolding --headless --headless --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --override-use-software-gl-for-tests --mojo-platform-channel-handle=1528 /prefetch:24⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1512,11016268087984916507,13577097613630068557,131072 --disable-features=PaintHolding --lang=en-US --service-sandbox-type=none --use-gl=swiftshader-webgl --headless --mojo-platform-channel-handle=1796 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --allow-pre-commit-input --field-trial-handle=1512,11016268087984916507,13577097613630068557,131072 --disable-features=PaintHolding --disable-databases --lang=en-US --headless --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=1908 /prefetch:14⤵PID:3128
-
-
-
C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exeC:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe on 127.0.0.1 529673⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020
-
-
C:\Windows\SysWOW64\cmd.execmd ver3⤵
- System Location Discovery: System Language Discovery
PID:4424
-
-
C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exeC:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe show3⤵
- Executes dropped EXE
PID:3144
-
-
C:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exeC:\Users\Admin\AppData\Roaming\byteexec\sysproxy-cmd.exe wait-and-cleanup 127.0.0.1 529673⤵
- Executes dropped EXE
PID:3564
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\System32\rundll32.exe url.dll,FileProtocolHandler http://localhost:62275/f34a5d93ccdd9499850d7da51f933ae7/?utm_campaign=startup&utm_content=&utm_medium=lantern&utm_source=windows3⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://localhost:62275/f34a5d93ccdd9499850d7da51f933ae7/?utm_campaign=startup&utm_content=&utm_medium=lantern&utm_source=windows4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe228f46f8,0x7ffe228f4708,0x7ffe228f47185⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:85⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:15⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:15⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:85⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:15⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:15⤵PID:552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:15⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:15⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,11467875551685088096,7139562569998376938,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1044 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize120B
MD5087b16eee12cf1193f413c0dab68a11f
SHA1439962d6de06d2ed1b784734203b1ce2d6e6c87f
SHA2563a7a8ea1a1c1a5b09f538e3ccc69498964dde531bdc7a3dca4fd3db383a49d2e
SHA512045a6590a0577fb12e81388f37203098e0eb7069906491d8d9a02f423b63906d3f6d184e12ab92bf382eaffa11516fd5fc4eb1d43b17b276704a0261464e808b
-
Filesize
598B
MD55afe17c8f7c1df6bdd3d4e6e39bc5606
SHA1f0d2d0569d8cab4c63786b3a7fbd2a73cb24c4d8
SHA2564e675ee9201aa92ad82c88ed84a4568b0c3121dc08c960eed4a31aa7e6869421
SHA512888ebbbb863b73ef1945b9188de0e1e2b3293e332bd98d9bc7febe4a01e107174cc0f38f8b3459ff8809f4c04bb0629e9e9a7bf192606636e4cdb2d1d20bbb05
-
Filesize
5KB
MD55f90cc725331cbebd9ba3e12eb596b2e
SHA163f7cff2a856eb14e31424825be5b04de07d2479
SHA256e3fc77d6805c364b7a3dd64e86de8dcf22a9edfe75042fe50a1235aaaef8de8e
SHA51201f98adf88e64dc403eb3419e1e1a9e3f3f6bc11fc5f152dc2698db5d73c7f59aed32850181d76404227f5b213920a800f07139685a28dc3a968c6db2d44ea96
-
Filesize
6KB
MD5a29b263903ed243cd314d0abd5023186
SHA1588b075ed3426fb94558d3fc1a22b455f3e8fa5b
SHA256d53431a12316153025b7670406d93d9efb8884b06d00ee6d36f7e24099e66ea0
SHA51254a2c273f7d9163cc070d52c4b3d9f6345920760c7c7280948f0d1788a9f4da7d7c6b5d2e9e148349c7b9181631811479bcf87a61f95e6f0570a45fc3ed30161
-
Filesize
6KB
MD53f0db8fce4dfbe3a091973bee17266fc
SHA1d3c489b020de4611b752e74064e210d05f061491
SHA256c2c614855c16699676e05bd983cbb4d52a72862c1725537720632068e15af33c
SHA512aed35bfb5ec6825a8e995c931e467cf00e39e1f5a5bd282ac7d4955fa17a9a486d7963e38f9201274499979b8991c4c2ec901dc4bc9a11dffa9ce033722ca5b0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ec57d743fed70c5c0d397d6fca610415
SHA1bb9380d1d8ac12e42b380fe1cd5e915b4c053484
SHA256270a9959de9ef71312e59e59454dee53f831da50b695d86cdc7ddcf19b612ace
SHA5122ecd1e4ed29cec8030580533e6bb53d62b47e80d952935816b8708b7bc7782deae1e20d6a4ec45c19039b2c3cafc4599e6e9b752755ae1550a9e50101aad1bec
-
Filesize
517B
MD545fc74ad5649a3ea786dfbf27d172bbf
SHA14c147eac3d91e399a94b7aafb5e4a7fa5eb625c4
SHA256f9c1b03e5d47cc7a75bc7e4c8a1b65595093411c45e6033c9412fd70ee5c6452
SHA51220a1d9c9f7e67c02278862d1bb3a12c046605cbf5458127ed4449286cf606bc6ae01d8e88d90db9e5ba8a3906aadb73e68cbd1e35b881b6722df5596a277c7ee
-
Filesize
255KB
MD5823faaf16ac4bab354c4ac8fc2eac7ce
SHA1daa46e24bc4f4826618efd5ceb4145906dc12c65
SHA256c8726168782c066fdf2cdb3056dd7b97f552e877b1b90e1a9ba2f96f46698ba2
SHA512a3a24cec9f6be246a0eea8ff43794930b0dc00eb763d3b8da58cc008a213462aa7dc3d766c07cfc0018b5dca99b9b698a4c623685f9969fe4d87b02579f2e0d2
-
Filesize
665B
MD555f6a4bb80fcf67adf73e7e85165f7a9
SHA15de8ca501a6769640d05acb22d298a5aa69af3c6
SHA256b0c66b842c579261f90dd117089654eab4d19d4e6a96b016fd79fe3ddf237749
SHA512735f4ee6c6e95d29f2bd509a02297c4e64dbfa5a48791e92e2c998fa1a22653fe0e15027d8528250a909b39b1073b869f497762cfc82e744b64fef73101e9faf
-
Filesize
176B
MD561aeac2c7f4bb30ae96d827ab9e6fa96
SHA12b74830eef1eabf9365f70244ec161e8a80572dd
SHA2569cb1b1186a928e97ada95ff9cd28272e7f9b0844db37c1e599df4e50b3ee0a67
SHA5125ed3408e79a4b2e1c8c20e2618022b5496d85ca0931a9d9a48553b7e1e40f2caf74bb9485f564c59444ba1de85e9e06945ccacba1c210f9b9b79403ce6a9167c
-
Filesize
166KB
MD566e52093b67d4dabb065375251cf12b7
SHA11767c633530199bd4fd203556bdab49e62ad103e
SHA256b204588e2d6ba037797ebe7d6b435d9403b769648d9166e42270dbf56187f5cd
SHA512f9f3b49a20e0ccfc8be4f1daf56e6b96eb84b5e98b5d1b55575e40ceef0dc4a3463d2de4f71d04c177235efdcb777971c68a8a2a19770d2d7f2ac7140e07141f
-
Filesize
59KB
MD5380d58a33faf71547fb97c3fc12a38a9
SHA104aecccd33b25abcf6889c81ed8c49a56f17aaac
SHA256a918aa182dd57a545b0416e406432a6d09d1232aa0c33a0969dcd39a432d0d6b
SHA5129331b00af5579e01ce017ed07fe2955ba4daeed9ae69140b3fd42785256d5ac125365275d33acad744d3639fcbf487d7008a5a0d34e4fb4bf887eef7c6ffa997